IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions Multimedia (View All Report Types)
 
Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: With an increase of bring your own device (BYOD) spaces, employees can perform their day-to-day work in a more flexible and productive way. This recorded webcast stacks up the top EMM operating system contenders: Apple's iOS, Android, and Windows. Click here to see which device and OS overcomes its competitors in the battle of EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

Case Study: Health Insurer Innovates its Endpoint Security
sponsored by CrowdStrike
VIDEO: This brief video describes how a major healthcare provider updated its security with a next generation endpoint protection platform.
Posted: 03 Aug 2015 | Premiered: 31 May 2015

CrowdStrike

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next generation tools such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Modernizing Data Protection for the SMB
sponsored by IBM
WEBCAST: In this video, two security experts discuss the data protection challenges that face SMBs today and provide suggestions for overcoming these challenges.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

IBM

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement