IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed    Add to Google    Add to My Yahoo!
ITM Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Case Study: A New Approach to Network Monitoring and Security
sponsored by Gigamon
VIDEO: This case study introduces a new security approach used by the University of Glasgow, a renowned academic institution, which improves network visibility and security without adding on expensive appliances. View now to learn how to detect and remedy infected endpoints, among other solutions.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015

Gigamon

How Microsoft Enables The Anywhere Workplace
sponsored by Data#3
VIDEO: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This animated video provides a framework for developing and implementing successful enterprise mobility strategies, as demonstrated by Microsoft's enterprise software suite.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

Data#3

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

The Benefits of Cloud Mobility Management
sponsored by BlackBerry
WEBCAST: In this webcast, discover how cloud EMM works and what benefits it provides.
Posted: 24 Apr 2015 | Premiered: Apr 9, 2015

BlackBerry

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
VIDEO: In this video, an information security expert discusses the results of his research to reveal hackers' most common motives and techniques.
Posted: 08 Jul 2015 | Premiered: 08 Jul 2015

Dell SecureWorks

Dell Converged Infrastructure Webcast
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to find out how converged infrastructures offer a way to combine the power of server, storage, and networking into one system. Take a look to see what Dell has to offer for converged infrastructures including architecture options available for compute, storage, networking, and management and monitoring.
Posted: 04 May 2015 | Premiered: May 4, 2015

Dell, Inc. and Intel®

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation

Why Scan to E-Mail Has Made Your Printers a Threat
sponsored by Nuance
VIDEO: This brief video explains why scanning and accidentally e-mailing documents to the wrong place can make your printer one of your company's greatest liabilities.
Posted: 24 Jun 2015 | Premiered: 03 Apr 2015

Nuance
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement