IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Homeland Security Presidential Directive 7

RSS Feed    Add to Google    Add to My Yahoo!
Homeland Security Presidential Directive 7 Multimedia (View All Report Types)
 
IoT Botnets and DDoS Attacks: The Stakes Have Changed
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 24 Oct 2017 | Premiered: Apr 6, 2017

Arbor Networks

Splunk Everywhere! Ransomware
sponsored by Splunk
WEBCAST: Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Proactively Protect Against Ransomware
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

Mobile device Management - Keep up with your mobile workforce
sponsored by Snow Software
VIDEO: Discover a device manager that has combined EMM and software asset management to minimize the impact of mobility on the service desk and deliver a safe environment for employees to use sensitive information and apps on mobile devices.
Posted: 20 Mar 2017 | Premiered: 26 Nov 2015

Snow Software

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
VIDEO: Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.
Posted: 19 Sep 2017 | Premiered: 19 Sep 2017

CyberArk Software, Inc

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

In Place Analytics for VSAM, ADABAS, DB2, IMS and more
sponsored by IBM
WEBCAST: Hear about the latest QMF enhancements and experience a demonstration of the self-service Business Analytics feature.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement