Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Internet Nanny

RSS Feed    Add to Google    Add to My Yahoo!
Internet NannyMultimedia (View All Report Types)
 
Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

What is driving transformation of data center networking?
sponsored by HP
WEBCAST: With the increase of employees communicating and receiving data from many different endpoints, having an agile and efficient network is a must-have. Virtualization has enabled IT professionals to work faster, but there is another strategy that may give better results.
Posted: 05 Aug 2014 | Premiered: Aug 5, 2014

HP

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

How user experience is a business differentiator
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

McAfee Email and Web Security Appliance Trial
sponsored by McAfee, Inc.
PRODUCT DEMO: Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

McAfee, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

GFI EventsManager
sponsored by GFI Software
TRIAL SOFTWARE: GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Measuring Software Quality: Why Your Metrics Don't Make the Grade
sponsored by IBM
WEBCAST: What keeps your customers happy when it comes to software? Tune into this video to learn more about what you can do to improve your software  testing and quality assurance. It outlines the pros and cons of satisfied customers and what the means for your business. View this resource now to learn more about improving your software.
Posted: 23 Apr 2013 | Premiered: Apr 23, 2013

IBM

Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement