IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing Security Multimedia (View All Report Types)
 
Protecting mobile devices - Best practices
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: Empower a mobile workforce with secure access to apps and data from a diverse set of mobile devices. Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

Citrix

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Webcast: Symantec Internet Security Threat Report 2014
sponsored by Symantec Corporation
WEBCAST: Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
Posted: 09 May 2014 | Premiered: May 9, 2014

Symantec Corporation

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement