IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

IHU Threats

RSS Feed    Add to Google    Add to My Yahoo!
IHU Threats Multimedia (View All Report Types)
 
IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Correlating SIM Information to Detect Insider Threats
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This Webcast details how to use the power of SIM information gathering and correlation to detect patterns of behavior indicative of insider misuse or attack.
Posted: 13 Jul 2007 | Premiered: Jun 18, 2007, 13:00 EDT (17:00 GMT)

Hexis Cyber Solutions Inc

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008

Lumension

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

The Benefits of Service-Aware CMDB
sponsored by ServiceNow
VIDEO: This brief video explores how Ahold Europe leveraged a service-aware Configuration Management Database (CMDB) strategy to create a single source of truth for IT.
Posted: 25 Feb 2016 | Premiered: 27 Nov 2015

ServiceNow

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

The Future of Simpler, Faster VDI Technology
sponsored by WorkSpot
WEBCAST: Exactly how important is VDI to the modern enterprise? Tune into this webinar now to learn about the future of VDI and how to overcome your desktop delivery conundrums. View now to also discover how important architecture is to secure application delivery.
Posted: 21 Apr 2016 | Premiered: Apr 21, 2016

WorkSpot

3 Reasons Why Traditional Hyperconvergence Is a Risky Choice
sponsored by Riverbed Technology, Inc.
WEBCAST: Hyperconvergence is a hot trend, but many solutions don't measure up. Learn how the best solutions keep data safer.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement