IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

Incident Response Teams

RSS Feed    Add to Google    Add to My Yahoo!
Incident Response Teams Multimedia (View All Report Types)
Webcast: How Innovations in IT are Revolutionizing Physical Security
sponsored by Pivot3
WEBCAST: This webcast discusses these leading-edge IT technologies with regards to the unique needs of video surveillance and physical security
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


Webcast: Global Hyper-Convergence 101: An Industry-Leading Advantage
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineering Team Lead at Pivot3, highlights one hyper-converged infrastructure (HCI) software solution that will ensure fault tolerance without replicating data. Access this video now to get an insider look at how to differentiate HCI provider offerings based on industry.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


The Digital Revolution, Simplified: Reinventing Mobile App Development with the Cloud
sponsored by Oracle Corporation
WEBCAST: This webcast previews a platform for cloud-based, backend mobile services that makes app development quicker, secure and easier to deploy. View now to access a strategy that offers rich mobile analytics, enabling enterprises to make smart business decisions.
Posted: 19 Aug 2015 | Premiered: Aug 19, 2015

Oracle Corporation

Ray Wang's 6 Requirements for Today's HR Applications
sponsored by Workday
WEBCAST: HR teams want applications to be simple, scalable, and stimulating. IT needs applications to be safe, secure, and sustainable. Access this webcast to hear Ray Wang of Constellation Research point the way to the best of both worlds.
Posted: 10 Jul 2015 | Premiered: Aug 19, 2014


Leverage Mobile Apps for Business Efficiency and Better Decision Making
sponsored by IBM
WEBCAST: Business and IT teams are aligned on mobile app strategies, but sometimes overlook end user satisfaction. Leverage this resource for ideas on how you can introduce new mobile capabilities in your business – driving positive user experiences, more accessibility to data (and securely), innovation and lower costs.
Posted: 04 Nov 2015 | Premiered: Aug 27, 2015


Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


Increase Security Effectiveness with Threat Intelligence
sponsored by Cyveillance, Inc.
WEBCAST: This webcast explains the benefits of implementing an effective threat intelligence system.
Posted: 13 Jul 2015 | Premiered: Jun 30, 2015

Cyveillance, Inc.

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Enterprise

Protect Your Enterprise with Security Monitoring
sponsored by Hewlett-Packard Enterprise
VIDEO: This brief video introduces a security monitoring system that effectively detects and stops risks.
Posted: 06 Apr 2015 | Premiered: 16 May 2014

Hewlett-Packard Enterprise

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Why Your Cybersecurity Needs to Advance
sponsored by BitDefender
VIDEO: This brief video discusses the dangers of traditional security and the importance of embracing sophisticated security measures. Take a look to learn how improving your security architecture can stop the rise of cybercrime.
Posted: 29 Oct 2015 | Premiered: 13 Oct 2015


Discover how to Optimize your SIEM
sponsored by
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

HPE's Proactive Customer Support within Social Media Channels
sponsored by Hewlett Packard Enterprise
WEBCAST: View this webcast to learn how a cloud-based customer engagement service monitors social media traffic in real-time to gain actionable information to strengthen customer relationships.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett Packard Enterprise

Application Security School
sponsored by
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013


6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013


2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009


PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013


Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement