IT Agents  >   Government Agencies (U.S.)  >   Department of Defense  >  

DDN NIC

RSS Feed    Add to Google    Add to My Yahoo!
DDN NIC Multimedia (View All Report Types)
 
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)

Ixia

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO: During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011

FireEye

Simplify Network Monitoring with Ixia Anue NTO
sponsored by Ixia
VIDEO: Are you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.
Posted: 03 Sep 2013 | Premiered: 03 Sep 2013

Ixia

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable Network Security
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable Network Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement