IT Management  >   Systems Operations  >   Security  >   Network Security  >  

DNS Attacks

RSS Feed    Add to Google    Add to My Yahoo!
DNS Attacks Multimedia (View All Report Types)
 
WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.

Device and Data Protection - Part 1
sponsored by Dell, Inc. and IntelĀ®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and IntelĀ®

The Perfect Storm of Data, Cloud, and the Internet of Things
sponsored by IBM
VIDEO: View this video to learn how the cloud, despite all its well-publicized benefits and shortcomings, has found a new use-case: in helping support the "internet of things."
Posted: 05 May 2015 | Premiered: 05 May 2015

IBM

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusions
sponsored by Citrix Ready and SMS Passcode
WEBCAST: Join this live webcast on May 21, 2015 to learn the best practices for securing your remote access against sophisticated hackers.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Citrix Ready and SMS Passcode

RaboBank's Journey from Agile to DevOps: Deliver Better Apps Faster, Without Compromises
sponsored by Perfecto Mobile
WEBCAST: In this webcast, watch as Rabobank, one of Europe's largest banks, shares how they transformed their mobile development team and practices to fully embrace DevOps.
Posted: 16 Apr 2015 | Premiered: Apr 6, 2015

Perfecto Mobile

Understand the Drivers Behind Hybrid Cloud Adoption
sponsored by Peer1
VIDEO: Tune into this video to discover the biggest drivers behind hybrid cloud adoption.
Posted: 22 May 2015 | Premiered: 22 May 2015

Peer1

Computer Network Management Made Easy
sponsored by Absolute Software
WEBCAST: This brief featured webcast highlights the burden of operating computer networks on a single platform. Use this resource to discover which technologies will enable you to manage both PCs and Macs easily from a single interface, as well as collect data regardless of device type.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement