IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Multimedia (View All Report Types)
 
How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015

IBM

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

What Are You Missing from Your 2016 Security Budget?
sponsored by OptioLabs
WEBCAST: Access this webcast to learn how to get the security you need while still balancing your budget.
Posted: 14 Dec 2015 | Premiered: Nov 23, 2015

OptioLabs

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Security Analytics Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

Mobile Security: Containerizing Enterprise Data
sponsored by Code42
WEBCAST: Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.
Posted: 01 Nov 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST: This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

Fujitsu

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement