IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Multimedia (View All Report Types)
 
Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this video, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Web Security: Revenge of the Vuln
sponsored by White Hat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

2015 Cybersecurity Legislation
sponsored by ESET
WEBCAST: This webcast gives you the background you need on proposed cybercrime laws and how they impact you.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Security Analytics Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security

Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST: This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

Fujitsu
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement