IT Management  >   Systems Operations  >   Security  >   Security Management  >  


RSS Feed    Add to Google    Add to My Yahoo!
Fraud Multimedia (View All Report Types)
Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009


IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013


Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014


Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Nova Southeastern University College of Dental Medicine Uses Virtualization Tools to Boost Simulation Labs
sponsored by Dell, Microsoft and Citrix
PODCAST: Find out how turning to desktop virtualization allowed Nova Southeast College of Dental Medicine in Ft Lauderdale, FL to provide students with the simulation lab technology needed to better prepare and train for their dental careers.
Posted: 12 Sep 2016 | Premiered: Apr 1, 2016

Dell, Microsoft and Citrix

How the HC380 is Changing the Hyper-Converged Market
sponsored by NTT ICT
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 06 Sep 2016 | Premiered: 16 Mar 2016


Put Your Customer First with Scalable and Adaptable Unified Infrastructure Monitoring
sponsored by CA Technologies
SOFTWARE DOWNLOAD: Are disparate monitoring systems tripping you up with convoluted complexity? Download here a free trial of CA Unified Infrastructure Management, which will empower your customer-first strategies with a scalable, adaptable unified monitoring solution—eliminating the need for disparate monitoring systems.
Posted: 13 Sep 2016 | Premiered: 13 Sep 2016

CA Technologies

Case Study: i-Virtualize Builds an Agile Architecture with VersaStack
sponsored by IBM
VIDEO: i-Virtualize, a cloud MSP, decided to implement a pre-integrated infrastructure stack that would provide them with the flexibility and versatility necessary to respond quickly and efficiently to customers' changing business needs. Witness how this agile architecture can increase your infrastructure's efficiency while reducing your TCO and risk.
Posted: 20 Oct 2016 | Premiered: 28 Aug 2015


Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement