IT Management  >   Systems Operations  >   Security  >  

Infosecurity

RSS Feed    Add to Google    Add to My Yahoo!
Infosecurity Multimedia (View All Report Types)
 
Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited

The Threat Landscape: A View from the Inside
sponsored by Dell SecureWorks
WEBCAST: In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe.
Posted: 12 Oct 2011 | Premiered: Oct 12, 2011

Dell SecureWorks

VigilEnt Policy Center 4.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

The Promise of Content-Aware Identity and Access Management
sponsored by CA Technologies.
PODCAST: This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy.
Posted: 24 Nov 2010 | Premiered: Oct 13, 2010

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement