IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Assessing Risk

RSS Feed    Add to Google    Add to My Yahoo!
Assessing Risk Multimedia (View All Report Types)
 
Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Governance rules to navigate data mobility and velocity complexities
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Mobile devices have become the Internet's dominant user interface, complicating GRC strategy for many companies. In this classroom, learn governance strategies to remain regulatory compliant as digital assets are increasingly available to users anywhere, at any time.
Posted: 12 Mar 2015 | Premiered: 09 Mar 2015

SearchCompliance.com

NetIQ Security Solutions for iSeries Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Minimize the Impact of Patch Tuesday
sponsored by Shavlik Technologies
WEBCAST: Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM, ET. Get information on the latest Microsoft Patches and how they could affect you and your network environment.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 12:00 EST (17:00 GMT)

Shavlik Technologies

Service Management with AppManager
sponsored by SUSE
WEBCAST: Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
Posted: 09 Aug 2006 | Premiered: Jun 3, 2004

SUSE

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

Introducing AppManager 6.0
sponsored by SUSE
WEBCAST: Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
Posted: 09 Aug 2006 | Premiered: Jul 15, 2004

SUSE

IBM Smart Analytics System offerings powered by IBM System X Servers video
sponsored by IBM
VIDEO: This 8 minute video illustrates how customers can quickly turn data into insights to support analytics, reporting and BI needs with solutions built on IBM System x, IBM System Storage and IBM Software. 
Posted: 17 Mar 2011 | Premiered: 17 Mar 2011

IBM

VigilEnt Policy Center 4.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement