Standards  >   Security Standards  >  

I P Sec

RSS Feed    Add to Google    Add to My Yahoo!
I P SecMultimedia (View All Report Types)
 
Best Practices to Device Control: An In-Depth Technical Webcast
sponsored by Lumension
WEBCAST: This webcast offers practical steps you can take to implement the device control and encryption technologies that will help you effectively address the vulnerabilities associated with removable storage devices. Watch and learn more about laying the groundwork for data security, technical enforcement, data protection policies, and more.
Posted: 16 May 2013 | Premiered: May 16, 2013

Lumension

How to Detect System Compromise and Data Exfiltration
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how cyber criminals target your vulnerabilities and offers a demo of a unified security management platform to help you combat these attacks.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Demo: RSA Security Analytics and RSA ECAT
sponsored by RSA
VIDEO: See key features of RSA Security Analytics 10.4 and RSA ECAT 4.0 in action including log collection, packet analysis, the addition of Netflow, and real-time malware analysis on the endpoint.
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA

Lessons Learned from the Target Data Breach
sponsored by Lumension
WEBCAST: This exclusive webcast explores key lessons learned from the high-profile security breaches in 2013.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Secure Cloud Access Reference Architecture & Use Model
sponsored by Intel
WEBCAST: This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection).
Posted: 28 Feb 2011 | Premiered: Mar 17, 2011, 14:00 EDT (18:00 GMT)

Intel

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement