IT Management  >   Systems Operations  >   Security  >  

Certification Authorities

RSS Feed    Add to Google    Add to My Yahoo!
Certification Authorities Multimedia (View All Report Types)
 
Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Reducing IT Complexity and Cost for SMBs with Hyper-converged Infrastructure
sponsored by Dell EMC, Intel and Nutanix
PODCAST: Tune into this podcast as Cale Hilts, Product Marketing Manager at Dell EMC, and Mark Lavi, DevOps Solutions Architect at Nutanix, discuss the impact that deploying a hyper-converged solution could have in your SMB. You'll learn how to use HCI for virtualized apps such as Microsoft SQL Server, Exchange, and SharePoint, and more.
Posted: 15 Nov 2017 | Premiered: Nov 7, 2017

Dell EMC, Intel and Nutanix

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

3 Tips for Virtual Environments and the Modern Data Center
sponsored by Commvault
VIDEO: Your hybrid IT strategy needs to include a plan for modernizing the data center assets you own and operate, including the virtual environments that you rely on every day. Discover how to avoid adding a new management tool for every new piece of infrastructure or cloud that is adopted into the hybrid IT estate.
Posted: 11 Aug 2017 | Premiered: 31 Jul 2017

Commvault

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST: Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

Cloud Security in 2 Minutes
sponsored by AWS-Cisco
VIDEO: Instead of adding hardware to their network, many organizations are moving to the public cloud. The problem is that this can increase your attack surface and vulnerability. Take 2 minutes to learn how entity modeling helps monitor threats, data exfiltration, and more in public clouds, private networks, and hybrid environments.
Posted: 08 Nov 2017 | Premiered: 10 Oct 2017

AWS-Cisco

The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

IBM Flash Storage Expands with Midrange All-Flash Products
sponsored by IBM
WEBCAST: IBM introduces midrange and entry-level all-flash options and adds a migration program directed at EMC-Dell customers.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Vident Health: More Than the Sum of its Parts
sponsored by McAfee, Inc.
VIDEO: Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement