IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security InformationMultimedia (View All Report Types)
 
Cloud Adoption: Hosting Sensitive Data in the Cloud
sponsored by Dell, Inc.
VIDEO: This video details some of the top concerns surrounding the cloud and covers what top cloud providers have done to sure up security.
Posted: 04 Jun 2014 | Premiered: 04 Jun 2014

Dell, Inc.

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Secure Mobile Devices without Restricting Users
sponsored by Bluebox
VIDEO: In this informativevideo, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 20 Aug 2014 | Premiered: 05 Mar 2014

Bluebox

Beth Israel Utilizes Lifecycle Management Solution to Keep Data Safe
sponsored by CommVault Systems, Inc.
VIDEO: Find out which lifecycle management solution Beth Israel utilizes to keep its data safe.
Posted: 10 Sep 2014 | Premiered: 22 Feb 2013

CommVault Systems, Inc.

HP Security Solutions
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement