IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Multimedia (View All Report Types)
 
Preventing PDF Exploits with Endpoint Security
sponsored by TrendMicro
VIDEO: See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.
Posted: 07 Nov 2016 | Premiered: 07 Nov 2016

TrendMicro

Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

The Total Economic Impact of Cleversafe
sponsored by IBM
WEBCAST: Forrester found that Cleversafe costs 72% less than similar RAID solutions. See further savings and business benefits.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Video Part 3: Operational Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS, Jamie Tischart, presents the operational questions to ask your cloud service provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Flash makes Apache's Data Sets Easy to Manage
sponsored by NetApp
VIDEO: Apache's modeling applications generate massive amounts of data sets. Find out why they turn to NetApp for solutions.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Put Your Customer First with Scalable and Adaptable Unified Infrastructure Monitoring
sponsored by CA Technologies
SOFTWARE DOWNLOAD: Are disparate monitoring systems tripping you up with convoluted complexity? Download here a free trial of CA Unified Infrastructure Management, which will empower your customer-first strategies with a scalable, adaptable unified monitoring solution—eliminating the need for disparate monitoring systems.
Posted: 13 Sep 2016 | Premiered: 13 Sep 2016

CA Technologies

Designing an Adaptive Security Architecture
sponsored by Intel Security
WEBCAST: Advanced attacks bypass blocking and prevention strategies. Implement an adaptive security architecture for protection.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement