IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Distributed Denial of Service Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Distributed Denial of Service Attacks Multimedia (View All Report Types)
 
Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Security implications of printers and imaging centers
sponsored by Hewlett-Packard Limited
WEBCAST: The following webcast examines the security concerns surrounding print and document services and delves into the insights of 2 industry experts as they reveal their solutions to print and document service security in today's vast market.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

Hewlett-Packard Limited

Better Defend Your Network with Better Anti-Malware
sponsored by Threat Track Security
WEBCAST: This webcast gives you the details on a comprehensive, reliable anti-malware system.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

Threat Track Security

Mobile and Business Critical Analytics Collide: Be Prepared
sponsored by IBM
WEBCAST: Your analytics strategy needs to adapt to the growth of mobile. Find out how you can take analytics with you anywhere.
Posted: 26 Feb 2015 | Premiered: Feb 26, 2015

TOPICS:  IT Management
IBM

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Welcome to the Age of End User Computing
sponsored by VCE
VIDEO: In this video, explore how VDI initiatives have changed over the years. Discover why now is the time to deploy VDI innovations by exploring the benefits and how converged infrastructures are combining with VDI to enhance the end-user computing environment for the mobile workforce.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement