IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Multimedia (View All Report Types)
 
How cities and counties took advantage of successfully deploying virtual desktops
sponsored by Unidesk Corporation
WEBCAST: Access this video to explore the reasons for IT administrators from cities and countries from across the country to implement VDI projects and how the benefits changed their IT and the delivery of vital government services.
Posted: 26 Nov 2014 | Premiered: May 15, 2014

Unidesk Corporation

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009

ESET

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

K2 Helps a Top Game Developer Improve Efficiency
sponsored by K2
VIDEO: Access this video case study to learn how Square Enix, a top game developer, was able to leverage K2 software to save time and focus on solving new challenges.
Posted: 24 Nov 2014 | Premiered: 20 Jan 2013

K2

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

CSC MyWorkStyle: The Next Generation Workforce
sponsored by CSC
WEBCAST: This exclusive webcast details a suite of mobile solutions that can solve key problems for EMM. Read on to learn more.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

CSC

A remedy for IT complexity and sprawl: Standardization
sponsored by Insight and Red Hat
VIDEO: Many IT departments struggle with IT complexity and sprawl. Standardizing an open, flexible infrastructure grow your business and eliminate sprawl and security and compliance requirements.
Posted: 19 Dec 2014 | Premiered: 23 May 2014

Insight and Red Hat

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement