IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

.NET Security

RSS Feed    Add to Google    Add to My Yahoo!
.NET SecurityMultimedia (View All Report Types)
 
Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

IT Overwhelmed by Workforce Mobility? The Benefits of IT Desk Services
sponsored by Hewlett-Packard Limited
VIDEO: This video covers a service provider that is here to help by reducing support costs with a single point of contact for all IT requests. Access this resource now and find out all about this service, including its core components.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

Hewlett-Packard Limited

Score & Prioritize: Strategically Plan Your Portfolio with Ease
sponsored by Innotas
WEBCAST: In this webinar, you'll discover why implementing a scoring and prioritization process is not only easy, but can bring significant benefits, while moving your organization towards strategic alignment with the business.
Posted: 12 Aug 2014 | Premiered: May 15, 2014

Innotas

Unified Windows Device Management
sponsored by Fiberlink
WEBCAST: Each entireprise is unique, so you need a flexible yet simple platform to manage your mobile environment. Enterprise IT is in the middle of a shift in how they provide support and do business, and enterprise management needs to do the same.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
PODCAST: Tune in to this informative podcast to gain crucial information about managed security solutions, and how they can help you monitor threats and prevent data breaches in your enterprise.
Posted: 13 Aug 2014 | Premiered: Aug 5, 2014

NEC Corporation of America

Tackling the Challenges of ITSM
sponsored by FrontRange Solutions Inc.
VIDEO: Discover 4 major challenges that are associated with ITSM and how a hybrid solution can tackle them effectively.
Posted: 29 Jul 2014 | Premiered: 02 Jan 2013

FrontRange Solutions Inc.

Move from Chaos to Control: Creating a Mature File Transfer Process
sponsored by IBM
WEBCAST: When it comes to moving files between people, business, and other processes a majority of organizations are struggling.  This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Premiered: Aug 20, 2014

IBM

Ensure the Safety & Security of Apps, Documents E-Mails and More
sponsored by IBM
VIDEO: Uncover the ins-and-outs of a leading secure productivity suite that promises to protect your employee's e-mails, documents, apps and the web for work.
Posted: 05 Sep 2014 | Premiered: 05 Sep 2014

IBM

Cloud Breaks IT: How a Broker Platform Can Help IT Harness the Power of Cloud
sponsored by Gravitant
WEBCAST: This exclusive webcast details how the cloud is not as easy, fast and cheap as people assume and offers cloud service brokerage as an important tool.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Gravitant

What is an IT-as-a-Service Catalog and Why is it a Necessity?
sponsored by Gravitant
WEBCAST: This webcast details the importance of and effective service catalog in the cloud that can combat the need for shadow IT.
Posted: 21 Jul 2014 | Premiered: Jul 21, 2014

Gravitant
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement