IT Management  >   Systems Operations  >   Security  >  

Audits

RSS Feed    Add to Google    Add to My Yahoo!
AuditsMultimedia (View All Report Types)
 
Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

7 Ideas to Improve Network Security in Healthcare
sponsored by Palo Alto Networks
WEBCAST: View this webcast to reveal 7 critical steps to improve healthcare IT security despite increasing network complexities.
Posted: 27 Dec 2013 | Premiered: Sep 30, 2013

Palo Alto Networks

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

What Auditors Think about Crypto
sponsored by Thales
WEBCAST: Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries.
Posted: 09 May 2011 | Premiered: May 9, 2011, 11:00 EDT (15:00 GMT)

Thales

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement