Software  >   Malware  >   Spyware  >  

Internet Advertising Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Advertising SoftwareMultimedia (View All Report Types)
 
Cybercrime: I Spy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This clasroom features expert advice on how to strategically identify and eradicate spyware, as well as the measures CIOs need to take to protect employees' and customers' digital identities.
Posted: 19 Jun 2014 | Premiered: 23 Jun 2014

SearchCIO.com

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Support Every Step of the Way
sponsored by CDW Corporation
VIDEO: This video examines how you can get comprehensive assistance with your software choices. Whether you're looking for help in planning software deployments or you're looking to design an optimal software approach, partnering with CDW can give you the insight you need to make sure you get the most out of your software.
Posted: 22 Oct 2014 | Premiered: 22 Oct 2014

CDW Corporation

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

On-Demand Webinar: Connecting the Internet of Things
sponsored by Red Hat
WEBCAST: The Internet of Things is exploding in size, measuring, collecting, analyzing, monitoring, and sharing useful information. View this webinar now to find out how information can be integrated into existing enterprise systems and analyzed to make smarter decisions and build more effective solutions.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Streaming and Visual Data Discovery for the Internet of Things
sponsored by Datawatch Corporation
WEBCAST: Tune into the following webcast to learn how companies are leveraging streaming and visual discovery technology to capitalize on the Internet of Things. In addition, hear about the current landscape of the Internet of Things, Industrial Analytics opportunities, and 6 requirements for IoT visualization success.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

Datawatch Corporation

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Living with open source software
sponsored by Hewlett-Packard Company
VIDEOCAST: This expert webcast highlights the risks of open source code in software projects, and explains why applications are vulnerable to attack from the moment they go live on the internet.
Posted: 07 Oct 2014 | Premiered: Sep 29, 2014

Hewlett-Packard Company

SDN Innovations in Campus
sponsored by Hewlett-Packard Company
WEBCAST: In this webcast, we will cover how SDN is impacting the campus environment and feature a location-aware SDN application providing WiFi Indoor positioning that enables context-aware location advertising for businesses and highlight how HP can unlock the business value of your network.
Posted: 10 Sep 2014 | Premiered: Sep 10, 2014

Hewlett-Packard Company

All Flash Array Data Services Software Teaser
sponsored by Violin Memory
WEBCAST: Watch the following teaser to learn more about a new software storage solution and its benefits, including flexible and powerful business continuity, data efficiency technologies, data protection features, and more.
Posted: 07 Jul 2014 | Premiered: Jun 11, 2014

Violin Memory

Essential Facts about Intelligent Load Balancing Software
sponsored by Nginx, Inc.
WEBCAST: View this on-demand webcast to find out if a solution like this is right for your business and for your customer. Tune in to find out about one vendor's system that helps you achieve peace of mind for your website and web applications by utilizing state-of-the-art intelligent load balancing.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

Nginx, Inc.

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

Capacity Planning in your Software-Defined Data Center
sponsored by nlyte Software
VIDEO: This webinar will provide a brief overview of the SDDC (including virtualization of servers, storage and networking) and then will focus on the expanded role of critical facilities and its coordination with IT service management in the SDDC.
Posted: 12 Aug 2014 | Premiered: 17 Sep 2013

nlyte Software

Boost Data Center Agility with Data Center Infrastructure Management
sponsored by nlyte Software
VIDEO: This webinar focuses on how to make your data center more agile with effective infrastructure management.
Posted: 12 Aug 2014 | Premiered: 26 Jun 2014

nlyte Software

Technical case study Steria and Veeam - three years later
sponsored by Veeam Software
WEBCAST: This case study highlights the partnership of Steria and Veeam. Together, they built a data center that could keep up with demands and manage big data in a complex, multitenant VMware vSphere environment.
Posted: 06 May 2014 | Premiered: Apr 15, 2014

Veeam Software

How Veeam and NetApp Deliver Advanced Data Protection for the Modern Data Center
sponsored by Veeam Software
WEBCAST: Check out this webcast to learn how the Veeam and NetApp combination can deliver advanced data protection for you data center and ensure immediate ROI.
Posted: 02 May 2014 | Premiered: Apr 17, 2014

Veeam Software

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WEBCAST: This webcast offers tips for planning, deploying and managing a new Exchange platform that links email, voice and fax communications into one unified infrastructure, creating a seamless user interface, integrated online services and controlled compliance.
Posted: 08 Oct 2013 | Premiered: Oct 8, 2013

Dell Software

Eric Herzog Presents New Enterprise Data Services Software
sponsored by Violin Memory
WEBCAST: Watch this webcast to learn and utilize new economic opportunities. Take advantage of the many benefits that come with this storage solution, including business continuance, data efficiency, data scaling, data protection, and more.
Posted: 07 Jul 2014 | Premiered: Jun 24, 2014

Violin Memory

Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Capacity Management and Planning Made Easy
sponsored by Avocent
WEBCAST: Watch this webcast to learn about a software tool that can help you plan your data center layout in order to avoid the challenges of IT confusion, insufficient cabling, lack of cooling, and high power usage.
Posted: 19 May 2014 | Premiered: May 19, 2014

Avocent

Medical image archiving: How to ensure availability
sponsored by BridgeHead and INHS
VIDEO: This video demonstrates how and why medical images are exposed to risk, as well as how health care providers can protect against them.
Posted: 18 Feb 2013 | Premiered: 18 Feb 2013

BridgeHead and INHS

News Corp Australia: How APIs Deliver Exceptional User Experience
sponsored by Intel® Services
WEBCAST: View this webcast to learn how News Corp Australia, a leading news organization in Australia, relies on APIs as the single thread for unification to deliver optimal user experience. News Corp Australia's lead API program manager will share high volume results and explain how APIs can benefit your business alike.
Posted: 25 Sep 2014 | Premiered: Jul 15, 2014

Intel® Services

Free Product Demo: How to Keep All Your Systems Safe and Up-to-Date
sponsored by Shavlik Technologies
PRODUCT DEMO: This free product demo covers a solution that will keep all of your systems up-t
Posted: 06 Oct 2014 | Premiered: 06 Oct 2014

Shavlik Technologies

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement