IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies Multimedia (View All Report Types)
 
Security Practices for Vmware
sponsored by Vyatta Inc.
WEBCAST: This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.
Posted: 03 Aug 2012 | Premiered: Jun 20, 2012

Vyatta Inc.

IBM Tivoli Security User Compliance Management Demo
sponsored by IBM
SOFTWARE DEMO: This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Cloud Access 360 Overview Video
sponsored by Intel
VIDEO: Intel’s Director of Product Management presents the need for enterprise class access control to the cloud. Learn about SSO for the cloud and how to avoid common pitfalls when deploying across multiple cloud providers.
Posted: 29 Mar 2011 | Premiered: 29 Mar 2011

Intel

Application Security Viewpoint
sponsored by Ounce Labs, an IBM Company
PODCAST: Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.
Posted: 03 Feb 2010 | Premiered: Feb 3, 2010

Ounce Labs, an IBM Company

Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST: Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008

Global Knowledge

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Security University: GRC Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

SearchCompliance.com

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement