IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed    Add to Google    Add to My Yahoo!
ITM Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Using Big Data and Behavioral Analytics to Enhance Cybersecurity
sponsored by Splunk
WEBCAST: Demetrios Lazarikos, IT security strategist and thought leader, addresses the growing importance of data security in enterprise, financial and healthcare industries. Demetrios also highlights how behavioral analytics, in combination with big data tools, can be used by IT security personnel to establish alerts and enhance security.
Posted: 01 Sep 2015 | Premiered: Jan 18, 2014

Splunk

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Fanatical Support in a Microsoft World
sponsored by Rackspace
WEBCAST: Managing Microsoft Cloud can be complex, but Fanatical Support makes sure everything runs as smoothly as possible users. From getting started to daily support and troubleshooting, Fanatical Support makes Microsoft Cloud simple. Watch this video to learn more about Fanatical Support and how it can support your business needs.
Posted: 18 May 2015 | Premiered: Jan 30, 2015

Rackspace

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
PODCAST: This podcast discusses ways to mitigate zero-day vulnerabilities and to detect subtle zero-day attacks.
Posted: 19 Aug 2015 | Premiered: Jul 30, 2015


The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

Anti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


An Inside Look into CA Workload Automation
sponsored by CA Technologies.
VIDEO: This video and accompanying demonstration offer an inside look into a workload automation tool that allows you to manage business processes from a single point of control.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement