IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Multimedia (View All Report Types)
Luxury Phone Manufacturer Uses Operational Metrics to Meet Customer Expectations
sponsored by Splunk
VIDEO: In this webcast, learn how luxury phone manufacturer Vertu leveraged operational analytics to improve their software reliability. Discover how they automated feedback from product testers and gained visibility so that software quality could be tracked over time.
Posted: 28 Oct 2015 | Premiered: 28 Oct 2015


Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


The Power of Cloud-Based Software-as-a-Service (SaaS)
sponsored by PR Television
WEBCAST: In this webcast, learn about the four major areas that all organizations should address to ensure mobile workforce security and learn about recent developments in the malware landscape and BYOD security.
Posted: 15 Oct 2015 | Premiered: Oct 15, 2015

PR Television

Mobile Devices, Wearables and the Future of Identity
sponsored by Centrify Corporation
WEBCAST: This webcast describes how the mobile devices we carry can help boost your enterprise's identity management and authentication security.
Posted: 22 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation

InfoSec Monitoring & Analytics in the Age of IoT and Digital Transformation
sponsored by Symantec Corporation
WEBCAST: In this webcast, an experienced security professional discusses how you can integrate monitoring and analytics into your security strategy to better defend against advanced threats.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015


Woolworth's Head of Infrastructure Talks IT Optimization
sponsored by Cisco Systems, Inc and Citrix
VIDEO: Tune into this brief video to learn how the head of infrastructure at a major retailer leveraged IT services with integrated technologies.
Posted: 03 Nov 2015 | Premiered: 05 May 2015

Cisco Systems, Inc and Citrix

Monitoring Citrix Mobile Workspace with SCOM plug-in
sponsored by ComTrade
VIDEO: This webcast details a plug-in for Microsoft System Center Operations Manager (SCOM) monitoring platform that monitors the Citrix Workspace Suite. Watch now to see a demo of this solution and find out how its capabilities cover the entire Workspace Suite components.
Posted: 12 Aug 2015 | Premiered: 22 May 2015


Privileged Access
sponsored by
VIRTUAL ENVIRONMENT: Learn how to implement effective logging and monitoring of privileged user accounts so a potential security incident involving privileged access can be quickly mitigated or avoided entirely.
Posted: 05 Nov 2015 | Premiered: 16 Oct 2015

Classify and Secure All Your Sensitive Data
sponsored by Identity Finder, LLC
VIDEO: This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.
Posted: 12 Oct 2015 | Premiered: 27 Dec 2013

Identity Finder, LLC
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement