IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed    Add to Google    Add to My Yahoo!
Closed Loop Security Multimedia (View All Report Types)
Plan Your Path to a Virtual Private Cloud
sponsored by Juniper Networks, Inc.
WEBCAST: This exclusive webcast will help you create a sound strategy for migrating to the private cloud.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

Juniper Networks, Inc.

Meet N-able Security Manager
sponsored by Solarwinds N-able
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

Solarwinds N-able

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Edge for the Mobile End User
sponsored by Unisys
VIDEO: This video features a service management solution that allows your mobile users to quickly and easily manage their service needs on the go—from any location and on any device.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015


Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement