IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Multimedia (View All Report Types)
Search Security University: Cyber Security
sponsored by
VIRTUAL ENVIRONMENT: Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009


WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009


What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Intrusion Prevention Systems Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Rx for Embedding Security into Vulnerable Healthcare Systems
sponsored by Certified Security Solutions (CSS)
WEBCAST: Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Gain Insights in an Instant with Integrated Infrastructure
sponsored by IBM
VIDEO: Tune into this brief video to learn from Steve Duplessie, ESG Founder & Senior Analyst, about an integrated infrastructure that's designed to deliver high levels of ease, efficiency, and versatility across the IT estate. Additionally, discover the top 6 reasons companies turn to integrated, full stack solutions.
Posted: 24 Oct 2016 | Premiered: 27 Jul 2015


Webinar: Dell Appliance for Wyse-Citrix
sponsored by Dell, Microsoft and Citrix
WEBCAST: Explore the Dell Appliance for Wyse-Citrix – an appliance empowering organizations to securely deliver anytime, anywhere, any device access to critical data and applications. You get an in-depth look into the appliance infrastructure and how you can get started using this cost-effective appliance today.
Posted: 29 Sep 2016 | Premiered: Aug 4, 2016

Dell, Microsoft and Citrix

Staying Out of the Next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn how to build an effective data protection solution to reduce leakage risk and comply with regulatory demands.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement