IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies Multimedia (View All Report Types)
 
Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

Mobile security policies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about applicable security policies that you can implement to neutralize today's biggest Android threats.
Posted: 01 Sep 2015 | Premiered: 19 Aug 2015

SearchSecurity.com

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

IBM Tivoli Security User Compliance Management Demo
sponsored by IBM
SOFTWARE DEMO: This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement