IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Multimedia (View All Report Types)
 
See How the Miami Marlins Protects Sensitive Scouting and Operation Documents
sponsored by Citrix
WEBCAST: Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.
Posted: 30 Aug 2016 | Premiered: Jul 22, 2016

Citrix

SAN 2016 Incident Response Survey: The Current Threat Landscape
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Protecting mobile devices - Best practices
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Don't be the next Yahoo
sponsored by Arctic Wolf Networks, Inc.
WEBCAST: This webcast breaks down the Yahoo data breach and explains what small and medium-sized businesses should take away from this situation.
Posted: 22 Nov 2016 | Premiered: Oct 6, 2016

Arctic Wolf Networks, Inc.

Video: Orchestrated Security for Private Cloud
sponsored by Intel Security
VIDEO: Data centers are now dynamic virtualized environments. Learn how to architect security into the private cloud by design.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Disrupting in the Digital Economy with an API Strategy
sponsored by IBM
WEBCAST: This webcast explores the use of an integrated creation, runtime, management, and security foundation for enterprise grade APIs and microservices. Unlock the value of existing IT investments to speed up development time, power modern digital apps, and expand brand reach.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016

IBM

Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Intrusion Prevention Systems Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

UZ Leuven Supports Mission-Critical SAP Data with Flash
sponsored by NetApp
VIDEO: Learn why UZ Leuven relies on Flash technology to support their mission-critical SAP data.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement