IT Management  >   Systems Operations  >   Security  >  

Computer Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Computer Security ThreatsMultimedia (View All Report Types)
 
Find Out How You Can Take Authentication Beyond Passwords
sponsored by HID
WEBCAST: In this webcast, uncover an identification solution that ensures your virtual private networks are only being accessed by authorized mobile users.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

HID

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Webcast: Why Conventional Security Tools Fail in Modern Data Centers
sponsored by CDW Corporation
WEBCAST: This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Posted: 21 Jul 2014 | Premiered: Jun 17, 2014

CDW Corporation

HID Global's ActivID® Authentication: Trailer
sponsored by HID
WEBCAST: In this webcast, catch a glimpse of an authentication system that offers layered tools to ensure secure remote access to any organization's private cloud and protected data.
Posted: 18 Nov 2013 | Premiered: Nov 18, 2013

HID

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Podcast: Security across your enterprise mobile devices: What you need to know
sponsored by BlackBerry
PODCAST: This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
sponsored by Lumension
VIDEO: In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Lumension

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement