IT Management  >   Systems Operations  >   Security  >   Information Security  >  

Government Security

RSS Feed    Add to Google    Add to My Yahoo!
Government Security Multimedia (View All Report Types)
 
Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software
sponsored by Commvault
VIDEO: Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.
Posted: 09 May 2016 | Premiered: 16 Oct 2015

Commvault

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009

ESET

CapEx vs. OpEx: Discovering Emerging Server and Storage Savings Options
sponsored by Curvature
WEBCAST: Tune into this webinar to examine several alternative server strategies to help maximize capacity of your servers and storage while staying within IT budget and also discover smarter capacity planning for your data center, buying for CapEx vs. OpEx, and more.
Posted: 01 Jun 2016 | Premiered: Mar 22, 2016

Curvature

Improve Business Decisions with Predictive Analytics in the Cloud
sponsored by IBM
VIDEO: Access this video to learn how you can generate predictive intelligence in the cloud without putting more strain on your IT department. Get the integrated capabilities you need to build and deploy cloud-based predictive models to unlock flexible, real-time analytics and enhance decision-making.
Posted: 26 Jul 2016 | Premiered: 16 Jul 2015

IBM

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

A Shift in Enterprise Storage
sponsored by IBM
VIDEO: Learn how to gain greater capacity in less rack space, with the ability to scale up flash capacity to 2 petabytes.
Posted: 01 Jul 2016 | Premiered: 01 Jul 2016

TOPICS:  IT Management
IBM

Video: How Next-Gen Servers Increase IT Productivity
sponsored by HPE and Intel®
VIDEO: This brief video explores 3 questions to ask regarding your server performance. Tune in to learn how you can increase IT staff productivity by switching to next-gen servers that keep up with demand, deliver IT services fast, and more.
Posted: 30 Jun 2016 | Premiered: 20 Nov 2015

HPE and Intel®

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement