Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >   IT Spending  >  

Data Security Spending

RSS Feed    Add to Google    Add to My Yahoo!
Data Security SpendingMultimedia (View All Report Types)
 
Joffe & Kindervag Explain DDoS Mitigation
sponsored by Neustar®
WEBCAST: This crucial webcast takes an in-depth look at DDoS attacks, discussing how they became such a global threat and what your organization can do to mitigate them.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Expect More From Your SIEM
sponsored by AlienVault
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Limited
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Limited

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

McAfee Email and Web Security Appliance Trial
sponsored by McAfee, Inc.
PRODUCT DEMO: Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

McAfee, Inc.

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement