IT Management  >   Systems Operations  >   Security  >  

CA

RSS Feed    Add to Google    Add to My Yahoo!
CA Multimedia (View All Report Types)
 
SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

IAM and Authentication Trends in 2015
sponsored by Gemalto
WEBCAST: This webcast takes into consideration the forces of the cloud, mobility, and user identity, and the way these forces are impacting IAM. The complex challenges created by these trends and what steps can be taken to overcome them are discussed.
Posted: 20 Aug 2015 | Premiered: Mar 24, 2015

Gemalto

Mitigate Complexity, Reimagine IT
sponsored by SAP America, Inc.
WEBCAST: In the following webcast, Carl Dubler demonstrates five technologies that promote innovation in IT. Tune in to discover details about simple data models, the modern user experience, and more.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

SAP America, Inc.

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
CA White Papers | CA Multimedia | CA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement