IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed    Add to Google    Add to My Yahoo!
ITM Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos

What's Driving Ransomware Attacks and How Should You Respond?
sponsored by Cisco Umbrella
WEBCAST: VP of Research at Gartner and leading authority on endpoint and server protection strategies, Peter Firstbrook, and Cisco Umbrella's CTO, Dan Hubbard, address the explosion of ransomware in the market and the simplest way for security practitioners to stay ahead of these attacks in this webcast.
Posted: 30 May 2017 | Premiered: Dec 30, 2016

Cisco Umbrella

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

A Day in the Life of a GDPR Breach
sponsored by Splunk
WEBCAST: This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.
Posted: 12 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Webinar: IT Trends 2017
sponsored by Snow Software
WEBCAST: With the current transformation of the business world, IT needs to find a way to operate on a tighter budget. This is where software asset management (SAM) comes in. Watch this webcast to learn the role SAM is going to play through 2020 and how it relieves the strain brought on by the growing IT-business gap.
Posted: 07 Jun 2017 | Premiered: Jun 5, 2017

Snow Software

Agile Development to Transform Your Application Testing Program
sponsored by IBM
WEBCAST: Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.
Posted: 21 Sep 2017 | Premiered: May 18, 2017

IBM

IoT Botnets: The Stakes Have Changed. Have you?
sponsored by Arbor Networks
WEBCAST: The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.
Posted: 25 Oct 2017 | Premiered: Nov 21, 2016

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement