Standards  >  

Internet Application Layer Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Layer Protocols Multimedia (View All Report Types)
 
Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Unified Communications for SBCs and SIP Networks
sponsored by Nectar Corp
WEBCAST: Watch this brief video to learn how to improve SIP performance with a single, integrated UC management platform. Find out how to unlock real-time network visibility with robust reporting and analytics.
Posted: 30 Aug 2017 | Premiered: Jun 30, 2017

Nectar Corp

Adobe ColdFusion 9
sponsored by Adobe Systems, Inc.
SOFTWARE DEMO: Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

Adobe Systems, Inc.

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

NACR

The Modes of Server Load Balancing
sponsored by A10 Networks
WEBCAST: Watch this webcast to uncover the 4 types of server load balancer integration methods, as well as the pros and cons for each, to help you decide which way best fits your organization's needs.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

A10 Networks

Orion IP Address Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Spreadsheets are manual and prone to error. You need a dynamic, scalable way to manage IP addresses. Orion IP Address Manager (IPAM) provides detailed visibility into IP address space usage. Leveraging advanced network scanning capabilities and Orion's intuitive interface, you can minimize IP conflicts and ensure your network is always humming.
Posted: 19 Aug 2009 | Premiered: 20 May 2009

SolarWinds, Inc.

How to Analyze the SIP Failures in Your Network
sponsored by NetScout Systems, Inc.
VIDEO: VoIP is commonly thought of as making external connections via simple paths. The truth is that these paths are often complex. This brief video demonstrates how to improve visibility, drill into network issues and triage SIP failures.
Posted: 11 Dec 2015 | Premiered: 11 Dec 2015

NetScout Systems, Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

View a Product Demo of Array APV Series ADCs
sponsored by Array Networks
VIDEO: View this demo to gain an understanding of the features, capabilities and benefits of Array's APV Series application delivery controllers (ADCs).
Posted: 14 Jul 2017 | Premiered: 27 Oct 2016

Array Networks

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

The Future of Privileged Management: Understanding the Bigger Picture
sponsored by One Identity
VIDEO: Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.
Posted: 16 Mar 2017 | Premiered: 08 Dec 2016

One Identity

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Turning the Tide Against Ransomware
sponsored by Proofpoint, Inc.
WEBCAST: WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.
Posted: 05 Oct 2017 | Premiered: Oct 5, 2017

Proofpoint, Inc.

How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Cisco Prime Collaboration Manager (CM) 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Uncover the details of Cisco Prime Collaboration Manager to learn how you can gain deeper network visibility, all the way down to the granularity of video flow statistics, to ensure an optimal end-user experience for your users.
Posted: 02 Jul 2012 | Premiered: 04 Nov 2011

Cisco Systems, Inc.

What’s New with IBM Cognos Business Intelligence V10.1
sponsored by IBM
PRODUCT DEMO: See what's new in IBM Cognos Business Intelligence V10.1 that makes it possible to connect everyone in your organization with the insight, analytics and information they need to make better, faster, smarter decisions.
Posted: 07 Feb 2011 | Premiered: 07 Feb 2011

IBM

The Netflow Next Generation Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: Learn about Cisco’s NetFlow Generation Appliance (NGA), a high-performing, scalable solution that establishes a new standard for high-performance and crows-device flow visibility in the data center for help with resource optimization, application performance improvement, traffic accounting, and security needs.
Posted: 02 Jul 2012 | Premiered: Jul 2, 2012

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement