IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Multimedia (View All Report Types)
 
WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009

ESET

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Jul 1, 2017

AlienVault

Digital Journey with DevOps
sponsored by Atos
VIDEO: IT will play an increasingly ambitious role in the years to come. As we push forward with digital transformation, DevOps will step into the spotlight. This webcast highlights the importance of DevOps practices and the role this new way of computing will improve the customer journey.
Posted: 21 Jun 2017 | Premiered: 23 Nov 2016

Atos

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Composite Authentication: The Evolution Beyond 2FA/MFA
sponsored by Crossmatch
PODCAST: In this podcast, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 26 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
sponsored by Aruba Networks
WEBCAST: Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network
Posted: 07 Jul 2017 | Premiered: Jun 21, 2017

Aruba Networks

Vertical Industry Opportunities for Digital Business
sponsored by Hewlett-Packard Enterprise
WEBCAST: Leverage Gartner's market insight to perfect your vertical industry strategies.
Posted: 08 Feb 2017 | Premiered: Feb 8, 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

Rapidly Turn Innovation Into Value With Digitalisation
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how digitalisation allows AkzoNobel to accelerate innovation and work smarter.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

Make Your Data More Valuable with Real-Time Analytics
sponsored by IBM
WEBCAST: Gain an understanding of real-time analytics and learn how to derive maximum benefit from your most valuable data.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement