IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Denial of Service Prevention

RSS Feed    Add to Google    Add to My Yahoo!
Denial of Service Prevention Multimedia (View All Report Types)
 
WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Network Barometer Report 2015
sponsored by Dimension Data
VIDEO: This brief video outlines the state of networks today, and what steps networking pros should take to future-proof their networks. Tune in to learn about what you can do to prevent network vulnerability, and how to provide the performance necessary for business critical application.
Posted: 15 Dec 2015 | Premiered: 01 Jun 2015

Dimension Data

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Stop Running Around for IT
sponsored by Dell, Inc. and Intel®
VIDEO: Watch this video to find out how one IT guy made his job more efficient with cloud client solutions from Dell, Citrix, and Intel. You'll learn how this combination of technologies can allow you to take back your life by simplifying desktop management.
Posted: 20 Jan 2016 | Premiered: 20 Jan 2016

Dell, Inc. and Intel®

Simplify IT Management, Simplify Your Life
sponsored by Dell, Inc. and Intel®
VIDEO: Watch this video to find out what happens when a new IT guy joins an office that uses the combination of Dell, Citrix, and Intel technology to power its organizations desktops. You'll discover how this technology landscape impacts their IT department.
Posted: 21 Jan 2016 | Premiered: 21 Jan 2016

Dell, Inc. and Intel®

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Microsoft Azure StorSimple Overview
sponsored by Microsoft
VIDEO: Learn the value StorSimple has brought to customers, with specific case studies on a range of businesses.
Posted: 14 Dec 2015 | Premiered: 14 Dec 2015

TOPICS:  IT Management
Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement