IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed    Add to Google    Add to My Yahoo!
AUP Multimedia (View All Report Types)
 
MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

How To Achieve Security in a World Where Developers Rule
sponsored by Rackspace
VIDEO: This webcast features Rackspace Cloud Solutions Architect Jaret Chiles, and Senior Product Security Engineer Matt Tesauro, who explain how to secure your applications in the cloud.
Posted: 13 Nov 2014 | Premiered: 09 Jun 2014

Rackspace

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Manage a Digitally Driven World By Streamlining Business Services
sponsored by Hewlett-Packard Limited
VIDEO: As businesses move forward into a new digital industrial era, the services required to send, receive, store and analyze documents need to adapt and progress. Access this video to find out how manufacturing companies can streamline crucial elements of business as the business world becomes more digitally driven.
Posted: 22 Jan 2015 | Premiered: 15 Dec 2014

Hewlett-Packard Limited

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Leveraging AWS Data to Manage Spend and Allocate Costs
sponsored by Cloudcheckr
WEBCAST: This webcast details how to best harness AWS cost data and learn about more cost management strategies.
Posted: 16 Mar 2015 | Premiered: Jan 22, 2015

Cloudcheckr

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
VIDEO: Access this video for data breach trends and statistics. Watch and learn how to avoid data breaches in the future.
Posted: 22 Jan 2015 | Premiered: 22 Jan 2015

Absolute Software

Workload Automation SaaS to the rescue
sponsored by IBM
VIDEO: This video explains how workload automation can help automate both simple and complex business processes.
Posted: 04 Feb 2015 | Premiered: 07 Aug 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement