IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Mobile Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Messaging Security Multimedia (View All Report Types)
 
Why You Need an Audit Trail
sponsored by Varonis
VIDEO: This brief video introduces a way to obtain an audit trail that gives you all the benefits of auditing without any of the drawbacks.
Posted: 25 Jun 2015 | Premiered: 25 Jun 2015

Varonis

3 Guidelines to Establishing Your Code Confidence
sponsored by Rogue Wave Software
WEBCAST: Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed. This webinar will explore how to deliver secure, compliant, and defect-free software.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Monitoring Citrix Mobile Workspace with System Center
sponsored by ComTrade
VIDEO: This webcast discusses a management and monitoring platform for Citrix Workspace Suite. Find out how its capabilities cover the Workspace suite components around workforce mobility and see a demo of each component.
Posted: 12 Aug 2015 | Premiered: 22 May 2015

ComTrade

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Dell Converged Infrastructure Webcast
sponsored by Dell, Inc. and IntelĀ®
WEBCAST: Access this webcast to find out how converged infrastructures offer a way to combine the power of server, storage, and networking into one system. Take a look to see what Dell has to offer for converged infrastructures including architecture options available for compute, storage, networking, and management and monitoring.
Posted: 04 May 2015 | Premiered: May 4, 2015

Dell, Inc. and IntelĀ®

Fundamentals of Application Release and Deployment
sponsored by IBM
WEBCAST: This webcast discusses strategies for automating the construction of applications as well as release and deployment.
Posted: 20 Jul 2015 | Premiered: Jun 19, 2014

IBM

Does the Cloud Fit into Hybrid Data Environments?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Shawn Rogers, Chief Research Officer in the Information Management Group at Dell, examines an advanced data analytics solution that enterprises can leverage in the cloud for enhanced data learning. View now to see how you can merge your enterprise cloud with others.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Dell, Inc.

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015


The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement