Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Programs

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blocking Programs Multimedia (View All Report Types)
 
Coordinating Sec, Dev, and Ops: Improving App Security for Agile Methodologies
sponsored by Veracode, Inc.
WEBCAST: This webcast explores how to update app security and improve software quality by integrating security into the app development process from beginning to end. Find out how to unite security teams with both Dev and Ops by leveraging strategies for building trust between the different teams and fostering collaboration.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

The Evolution from Two-Factor Authentication to Identity Assurance
sponsored by RSA
VIDEO: Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.
Posted: 31 Aug 2017 | Premiered: 29 Aug 2017

RSA

Digital Transformation BPM and RPA
sponsored by K2
WEBCAST: Explore how to combine BPM, RPA, AI, and low-code development to standardize and automate processes as well as improve efficiency, compliance, and reporting for digital transformation initiatives.
Posted: 16 Oct 2017 | Premiered: Oct 6, 2017

K2

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)

Ixia

Cisco Prime Network Control System 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
Posted: 02 Jul 2012 | Premiered: 22 Jun 2012

Cisco Systems, Inc.

IBM Spectrum Scale for Big Data & Analytics
sponsored by IBM
WEBCAST: Access this demo to see how you can draw quick insights from social media data using software-defined storage. Learn to analyze this data in near-real time and dynamically manage the data to keep storage costs low.
Posted: 28 Apr 2015 | Premiered: Feb 18, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement