Standards  >  

Internet Application Layer Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Internet Application Layer Protocols Multimedia (View All Report Types)
 
Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

Adobe ColdFusion 9
sponsored by Adobe Systems, Inc.
SOFTWARE DEMO: Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

Adobe Systems, Inc.

How to Analyze the SIP Failures in Your Network
sponsored by NetScout Systems, Inc.
VIDEO: VoIP is commonly thought of as making external connections via simple paths. The truth is that these paths are often complex. This brief video demonstrates how to improve visibility, drill into network issues and triage SIP failures.
Posted: 11 Dec 2015 | Premiered: 11 Dec 2015

NetScout Systems, Inc.

Orion IP Address Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Spreadsheets are manual and prone to error. You need a dynamic, scalable way to manage IP addresses. Orion IP Address Manager (IPAM) provides detailed visibility into IP address space usage. Leveraging advanced network scanning capabilities and Orion's intuitive interface, you can minimize IP conflicts and ensure your network is always humming.
Posted: 19 Aug 2009 | Premiered: 20 May 2009

SolarWinds, Inc.

The Quest for Killer SIP Apps
sponsored by NACR
WEBCAST: Learn the benefits SIP can bring to your organization – helping you provide a heterogeneous UC environment to your users, increase enterprise mobility, ensure the delivery of communications applications, and more!
Posted: 13 Jun 2012 | Premiered: May 31, 2012

NACR

The Modes of Server Load Balancing
sponsored by A10 Networks
WEBCAST: Watch this webcast to uncover the 4 types of server load balancer integration methods, as well as the pros and cons for each, to help you decide which way best fits your organization's needs.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

A10 Networks

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Best Practices for Eliminating SSL Encrypted Traffic Blind Spots
sponsored by Blue Coat Systems
WEBCAST: Learn how to apply policies and protection to combat threats hidden in HTTPS traffic and applications in this helpful webcast.
Posted: 19 Feb 2016 | Premiered: Jan 22, 2016

Blue Coat Systems

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix
PODCAST: Discover how to expand your business reach by partnering with an internationally recognized company. See how much your business stands to benefit from leveraging this company's brand and global marketplace solution.
Posted: 17 Nov 2015 | Premiered: Nov 6, 2015

Citrix

Enterprise Mobility University: Enterprise BYOD Management
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: This classroom discusses security, application management, authentication, and best practices for developing and implementing a workable BYOD strategy.
Posted: 17 Mar 2014 | Premiered: 13 Mar 2014

SearchMobileComputing

Create a Workplace for a User-Centric World
sponsored by Atos
VIDEO: Discover in this video how digitalized services with seamless technologies can facilitate digital transformation in 4 core areas of your business: customer experience, business reinvention, compliance, and operational excellence. Tune in to also see how Windows 10 and other collaborative platforms pair with these services.
Posted: 27 Jun 2016 | Premiered: 27 Jun 2016

Atos

Operational Excellence: Transforming Your Virtual Workplace and Digital Diversity
sponsored by Atos
VIDEO: Find out how to ensure continuity in the face of digitally disruptive technologies, by discovering how to standardize granular business processes and utilize technology interfaces that enable seamless and dynamic construction of end-to-end capabilities.
Posted: 27 Jun 2016 | Premiered: 27 Jun 2016

Atos

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.
Posted: 26 Jul 2016 | Premiered: Jul 26, 2016

AlienVault

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

Network Evolution University: Realizing the Benefits of Enterprise UC&C
sponsored by SearchUnifiedCommunications.com
VIRTUAL ENVIRONMENT: This virtual seminar focuses on how changing workforce practices are influencing unified communication strategies, how today's cloud UC services can serve businesses, and how your employees can communicate and collaborate effectively individually and in teams whether in the office, remote, or on the road.
Posted: 11 Jun 2013 | Premiered: 11 Jun 2013

SearchUnifiedCommunications.com

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Evolve Your WAN to an SD-WAN
sponsored by Silver Peak
WEBCAST: This short video teaches you how a software-defined WAN based on broadband can give you the flexibility, control and performance necessary to connect users to cloud-based and mobile applications.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

The Time for a Broadband WAN is Now
sponsored by Silver Peak
WEBCAST: Access this webcast to learn how adopting a broadband connected WAN can improve your business.
Posted: 09 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: Explore a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. Access this brief webcast to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

MapXtreme Java v4.8.1
sponsored by MapInfo Corporation
TRIAL SOFTWARE: This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.
Posted: 10 Mar 2008 | Premiered: 10 Mar 2008

MapInfo Corporation

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

BlackBerry Java Development Environment
sponsored by BlackBerry
TRIAL SOFTWARE: The BlackBerry® Java® Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java ME™) applications for Java-based BlackBerry® smartphones
Posted: 18 Feb 2008 | Premiered: 18 Feb 2008

BlackBerry

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement