IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Multimedia (View All Report Types)
 
Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Podcast: Transform Your Customer‘s Infrastructure and Accelerate Your Profitability with HP Networking Converged Campus Offerings
sponsored by Hewlett-Packard Company
PODCAST: Access this Podcast now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

Ensuring Data Security in the Cloud and on Endpoints
sponsored by WinMagic
WEBCAST: This webcast explores the risks of cloud file sync and share services and how to ensure data protection in the cloud.
Posted: 01 Jul 2015 | Premiered: Jun 3, 2015

WinMagic

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Practitioners Guide to Establishing a SOC Webinar
sponsored by AlienVault
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO: During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011

FireEye

Borderless Networks - Are You Ready?
sponsored by Cisco Systems, Inc.
VIDEO: Cisco Borderless Networks allow you to deliver network services and applications to anyone, anywhere, on any device, at any time. Watch this video to learn how you can take advantage of all it has to offer.
Posted: 24 Mar 2010 | Premiered: 24 Mar 2010

Cisco Systems, Inc.

GFI WebMonitor 2012
sponsored by GFI Software
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012

GFI Software

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement