Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Programs

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blocker Programs Multimedia (View All Report Types)
 
More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Visualization: How it all comes together
sponsored by GE Healthcare
WEBCAST: Healthcare is evolving and becoming more patient-centric. Tools and software are being released to provide better visibility to data once stored in silos. Today, healthcare workers need a single workstation that provides access to advanced processing tools. Access this webcast for an introduction to an imaging application.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

GE Healthcare

SearchSecurity.com University: Network Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Posted: 07 Aug 2013 | Premiered: 07 Aug 2013

SearchSecurity.com

How Do You Select ERP for Defense Manufacturing? – Podcast
sponsored by IFS
PODCAST: Find out how the unique characteristics of defense manufacturing operations affect their needs in the area of enterprise resource planning (ERP).
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

IFS

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

McAfee Email and Web Security Appliance Trial
sponsored by McAfee, Inc.
PRODUCT DEMO: Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

McAfee, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Rational Quality Manager
sponsored by IBM
SOFTWARE DOWNLOAD: Download your free trial of IBM Rational Quality Manager V2, a collaborative, Web-based, quality management solution that offers comprehensive test planning and test asset management from requirements to defects.
Posted: 04 Nov 2009 | Premiered: 04 Nov 2009

IBM

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement