IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Multimedia (View All Report Types)
 
App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

Waste and Risk: The Problems Posed by Printers
sponsored by Nuance
VIDEO: This humorous video demonstrates how easily a simple print job can go wrong – and what you can do to stop that from happening.
Posted: 24 Jun 2015 | Premiered: 22 Apr 2015

Nuance

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by White Hat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 14 Apr 2015 | Premiered: Dec 31, 2013

White Hat Security

Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security

Modernize Your Backups for Modern Data Volumes
sponsored by IBM
VIDEO: This brief video discusses how an effective storage management platform can not only simplify your storage, but enhance data backup and protection as well.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

IBM

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

The Dangers of an Insecure Printer
sponsored by Hewlett-Packard Limited
WEBCAST: Access this brief video to learn why your multifunction printers may be putting your organization at risk and what you can do about it.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the stress of MDM and bring your company into the new age of mobility. View now to see how your BYOD strategy can become simple, secure, and cost-effective.
Posted: 06 Jul 2015 | Premiered: 23 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement