IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Multimedia (View All Report Types)
 
Diminish Threats and Increase Efficiency With Content Filtering
sponsored by AVG Technologies
PRODUCT DEMO: This exclusive cloud content filtering demo reveals how you can maximizes the positives of the Internet while steering clear of the negatives.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

Data Centers at Your Door: Prefabricated Modules from Schneider Electric
sponsored by Schneider Electric
VIDEO: Prefabricated data centers allow you to do just this. Access this video to learn how prefabricated IT and hydronics modules from Schneider Electric allow you to deliver a flexible and efficient data center built specifically for your needs without any of the guesswork.
Posted: 31 Oct 2014 | Premiered: 12 Jun 2014

Schneider Electric

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

The New Rules of Data Security: Best Practices to Secure Data and Ensure Compliance
sponsored by IBM
VIRTUAL ENVIRONMENT: This virtual environment contains 4 informative webcasts discussing the new rules of data security.
Posted: 09 Feb 2015 | Premiered: 29 Jan 2015

IBM

Thrive, Survive or Perish - How the New Style of IT Changes Service Delivery
sponsored by Hewlett-Packard Company
VIDEO: View this webcast to learn about the new style of IT and how you can provide improved service delivery. Discover a converged console solution that automates every day maintenance tasks to liberate your admins to pursue innovative and transformative projects.
Posted: 08 Dec 2014 | Premiered: 05 Nov 2014

Hewlett-Packard Company

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Rethinking the Paradigm of Advanced Threats
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015

SearchSecurity.com

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Best Practices for Enterprise Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Watch this webcast to get advice from a panel of cloud service provider CEOs and cloud experts. The panel provides the best practices for protecting enterprise data in the cloud.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:01 EDT (05:01 GMT)

Druva Software

Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud
sponsored by IBM
WEBCAST: Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.
Posted: 24 Oct 2014 | Premiered: Sep 30, 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement