IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Attacks Multimedia (View All Report Types)
 
Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

IDC Webcast: Advanced SD-WAN Powering the Cloud-Connected Enterprise
sponsored by Silver Peak
WEBCAST: Learn about the need for WAN transformation to support cloud-connected enterprises and digital transformation initiatives. Get the facts from IDC about the current state of SD-WAN, its potential benefits, and use cases. Plus, hear about one of the leading SD-WAN edge tools.
Posted: 18 Aug 2017 | Premiered: Aug 18, 2017

Silver Peak

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Get a 30-Day Free Trial of Array's vAPV Virtual Load Balancer
sponsored by Array Networks
TRIAL SOFTWARE: Available for leading hypervisors and public clouds, as well for Array's Network Functions Platforms, Array's virtual load balancing solutions support all of the features and functionality of Array's dedicated hardware appliances.
Posted: 18 Jul 2017 | Premiered: 18 Jul 2017

Array Networks

Composite Authentication: The Evolution Beyond 2FA/MFA
sponsored by Crossmatch
PODCAST: In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 26 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

What is Next-Generation Antivirus, or NGAV?
sponsored by Carbon Black
VIDEO: Next Generation Antivirus (NGAV) prevents cyberattacks on a large spectrum and provides more coverage with less resource requirements. Learn more about NGAV in this webcast.
Posted: 11 Aug 2017 | Premiered: 19 Jul 2017

Carbon Black

Cisco Umbrella: How does it Improve Security Effectiveness?
sponsored by Cisco Umbrella
VIDEO: Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.
Posted: 28 Jul 2017 | Premiered: 03 Feb 2017

Cisco Umbrella
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement