IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

GTIN

RSS Feed    Add to Google    Add to My Yahoo!
GTIN Multimedia (View All Report Types)
 
SAN 2016 Incident Response Survey: The Current Threat Landscape
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement