IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Multimedia (View All Report Types)
 
The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009

ESET

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

State-of-the-art Technology Exceeds Customer Expectations
sponsored by NetApp
WEBCAST: Discover how NetApp All Flash FAS enables businesses to enrich the end-user experience and operate more competitively.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

TOPICS:  IT Management
NetApp

Flash makes Apache's Data Sets Easy to Manage
sponsored by NetApp
VIDEO: Apache's modeling applications generate massive amounts of data sets. Find out why they turn to NetApp for solutions.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Reduce Backup Time From Days to Hours
sponsored by NetApp
WEBCAST: Find out how the Zoological Society of London boosted storage capacity and replaced an outdated archiving system.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016

TOPICS:  IT Management
NetApp

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement