IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Mobile Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Messaging Security Multimedia (View All Report Types)
 
Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Welcome to the Age of End User Computing
sponsored by VCE
VIDEO: In this video, explore how VDI initiatives have changed over the years. Discover why now is the time to deploy VDI innovations by exploring the benefits and how converged infrastructures are combining with VDI to enhance the end-user computing environment for the mobile workforce.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

nti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Customer Testimonial: Levi's
sponsored by Commvault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

Commvault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement