IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Mobile Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Messaging Security Multimedia (View All Report Types)
Monitoring Citrix Mobile Workspace with SCOM plug-in
sponsored by ComTrade
VIDEO: This webcast details a plug-in for Microsoft System Center Operations Manager (SCOM) monitoring platform that monitors the Citrix Workspace Suite. Watch now to see a demo of this solution and find out how its capabilities cover the entire Workspace Suite components.
Posted: 12 Aug 2015 | Premiered: 22 May 2015


Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Podcast: Aventura & Brian Madden Talk Virtualization in Healthcare
sponsored by Aventura
PODCAST: In this podcast, independent analyst Brian Madden sits down with a leader in healthcare technology to discuss VDI and desktop virtualization. Listen now and find out how you can take context into consideration with each patient in virtualized care environments.
Posted: 15 Oct 2015 | Premiered: Oct 15, 2015


Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Single Sign-On: Past, Present, and Future
sponsored by Centrify Corporation
WEBCAST: Join Pete Lindstrom, Research Director for IDC's Security Products program, and Chris Webber, Security Strategist with Centrify, to learn how the lessons of the past can help IT springboard into the future of Identity.
Posted: 22 Oct 2015 | Premiered: Mar 16, 2015

Centrify Corporation

Re-Imagining Business in the Digital Economy
sponsored by SAP America, Inc.
WEBCAST: In this webcast, join Amr El Meleegy and Christopher Dinkel as they describe tech trends that are inspiring disruption across the organization. Learn how to leverage these disruptors by enabling IT with technical debt reversal, social activation, cloud orchestration, and more.
Posted: 10 Aug 2015 | Premiered: Jun 25, 2015

SAP America, Inc.

What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: Watch this video to see Brian Madden deal with updating desktop servers which result in none of the updated computers having the same image deployment. Find out how application virtualization solutions that don't include image deployment can be an ambitious task for IT pros to handle.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.

Luxury Phone Manufacturer Uses Operational Metrics to Meet Customer Expectations
sponsored by Splunk
VIDEO: In this webcast, learn how luxury phone manufacturer Vertu leveraged operational analytics to improve their software reliability. Discover how they automated feedback from product testers and gained visibility so that software quality could be tracked over time.
Posted: 28 Oct 2015 | Premiered: 28 Oct 2015


Enhance your Enterprise's IAM
sponsored by
VIRTUAL ENVIRONMENT: This virtual environment explores how you can implement advanced IAM to prevent hacks from coming through third-party vendors and other vulnerable spots.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement