IT Management  >   Systems Operations  >   Security  >  

Management of Security Information

RSS Feed    Add to Google    Add to My Yahoo!
Management of Security Information Multimedia (View All Report Types)
 
Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general. Learn about security as a "secondary layer," removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement