Hardware  >   Security Hardware  >  

Network Security Devices

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Devices Multimedia (View All Report Types)
How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015


STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

SearchSecurity.com University: Network Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Posted: 07 Aug 2013 | Premiered: 07 Aug 2013


PlateSpin Forge: "Plug in and Protect" Disaster Recovery
sponsored by Novell, Inc.
WEBCAST: PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Posted: 01 Sep 2009 | Premiered: Sep 1, 2009

Novell, Inc.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010


Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012


Optimizing for the Cloud with Data Center Virtualization
sponsored by Brocade
WEBCAST: Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement