Hardware  >   Security Hardware  >  

Crypto Accelerators

RSS Feed    Add to Google    Add to My Yahoo!
Crypto Accelerators Multimedia (View All Report Types)
 
Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
WEBCAST: Discover how Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Learn how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 05 Jul 2016 | Premiered: Feb 29, 2016

Dimension Data

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

PlateSpin Forge: "Plug in and Protect" Disaster Recovery
sponsored by Novell, Inc.
WEBCAST: PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Posted: 01 Sep 2009 | Premiered: Sep 1, 2009

Novell, Inc.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Infrastructure Monitoring with Speed at Scale
sponsored by SevOne
VIDEO: Denial of service attacks are becoming more prevalent. This resource displays how denial of service attacks can be detected, identified and analyzed. View now and see a simulated attack on a network and see all of the functionality available in one monitoring tool.
Posted: 17 Sep 2015 | Premiered: 17 Sep 2015

SevOne

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Breaking the Kill Chain of Advanced Attacks
sponsored by Fortinet, Inc.
WEBCAST: Tune into this brief webcast to explore ways to augment and enhance defense structures you already have in place. Uncover a 3-pronged network security approach that can help you avoid becoming the next breach victim.
Posted: 05 Jun 2015 | Premiered: Dec 31, 2014

Fortinet, Inc.

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement