IT Management  >   Systems Operations  >   Security  >  

Managing Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing SecurityMultimedia (View All Report Types)
 
Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

The power of the Citrix mobility solution, XenMobile
sponsored by Citrix
WEBCAST: This informative webcast examines a mobile device management (MDM) solution from industry giant Citrix that can secure and manage the devices within your enterprise environment easily and effectively. Tune in now to see a demo of this tool and see first-hand how simple and helpful it really is.
Posted: 29 Oct 2013 | Premiered: Oct 29, 2013

Citrix

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

What Security Pros Need to Know About Cloud
sponsored by CloudPassage
WEBCAST: In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.
Posted: 01 Apr 2014 | Premiered: Apr 1, 2014

CloudPassage

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Mobile Security: Containerizing Enterprise Data
sponsored by Code42
WEBCAST: Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.
Posted: 01 Nov 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement