IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security SolutionsMultimedia (View All Report Types)
 
Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014

Hexis Cyber Solutions Inc

Your Data has Left the Building; What are You Doing to Protect it?
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Implement Effective Networking and Security in Your Cloud Environment
sponsored by Zentera Systems Inc.
VIDEO: This exclusive video covers the value of an overlay virtual infrastructure that can implement networking and security in your cloud environment.
Posted: 05 Sep 2014 | Premiered: 05 Sep 2014

Zentera Systems Inc.

Real-World Security Testing: Why Industry Experts Say it's Essential
sponsored by Fortinet, Inc.
WEBCAST: Tune in to this webinar to separate the facts from hype as industry experts examine how organizations can best bolster their IT defense, and why real-world testing is a critical part of any security solution. W
Posted: 31 Jul 2014 | Premiered: May 7, 2014

Fortinet, Inc.

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

How to Quickly and Easily Configure Patch Management Policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: Learn how simple it is to configure patch management policies.
Posted: 09 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement