Software  >   Malware  >   Spyware  >  

Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Advertising Software Multimedia (View All Report Types)
 
Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

The Journey to Software-Defined Everything
sponsored by SevOne
WEBCAST: This short video demonstrates how applications and services can be more effectively distributed over a software-defined network. Access now to see how SevOne and Cisco have come together to build an application-centric infrastructure.
Posted: 08 Mar 2016 | Premiered: Mar 8, 2016

SevOne

The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications
sponsored by IBM
WEBCAST: This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.
Posted: 25 Aug 2016 | Premiered: Jul 1, 2016

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premiered: Aug 20, 2016

AllClear ID

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

Overcoming the challenges presented by mobility in the enterprise
sponsored by IBM MaaS360
WEBCAST: This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.
Posted: 10 Aug 2016 | Premiered: May 25, 2016

IBM MaaS360

NCSU - IBM PowerLinux - Industry standard Linux systems, solutions tuned to the task
sponsored by IBM
WEBCAST: This video explores a leading solution delivering industry standard Linux systems services faster, with higher quality, and more economically than others. Learn how it combines a leading hardware, Linux software, and domain expertise of different industries resulting in higher quality operations that keep pace with modern business.
Posted: 20 Oct 2014 | Premiered: Apr 23, 2012

IBM

Why Traditional Security Fails
sponsored by Intel Security
PODCAST: Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.
Posted: 28 Jun 2016 | Premiered: May 1, 2016

Intel Security

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement