Emerging Technologies  >  

Neural Network Applications

RSS Feed    Add to Google    Add to My Yahoo!
Neural Network Applications Multimedia (View All Report Types)
Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Every day, hackers develop new strategies for infiltrating your network and stealing your sensitive data. This expert resource explores some of the most dangerous emerging threats and how you can defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015


Best Practices for Private Cloud Migration: Reduce Storage Migration Risks
sponsored by Virtual Instruments
WEBCAST: The private cloud offers fast service on demand at a lower cost. So why are many organizations slow to adopt this technology? Many organizations find the challenge and groundwork necessary to move to the cloud daunting. This webcast can help.
Posted: 02 Jun 2011 | Premiered: Jun 2, 2011

Virtual Instruments

How to Power Your Enterprise Network and Transform Your Data Center
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: This webcast explains how to automate network provisioning and control based on application requirements and policies, both for datacenter and enterprise environments. View now to learn how to transform your enterprise network with accelerated application deployment.
Posted: 06 Nov 2015 | Premiered: Aug 31, 2014

Cisco Systems, Inc and Citrix

Webcast Series: ACI Implementation Workflow Tutorials
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: In this series of webcasts, Citrix Principal Technical Marketing Engineer demonstrates how to deploy an application service. View this webcast now to learn about pre-provisioning process for SDX in an ACI environment and more.
Posted: 10 Nov 2015 | Premiered: Nov 10, 2015

Cisco Systems, Inc and Citrix

From Whiteboard to Production: ACI and Automating Load Balancing
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: In this webcast, you will learn how to automate load balancing and promote real-world enterprise solutions using software-defined networking, together with Cisco ACI and Citrix NetScaler. View now to see this automation process in action.
Posted: 06 Nov 2015 | Premiered: Nov 6, 2015

Cisco Systems, Inc and Citrix

Solving Performance Issues Impacting Citrix-based Services with Continuous Real-Time Performance Analytics
sponsored by Citrix and Netscout
WEBCAST: This webinar will explore the challenges of Service Assurance for IT professionals managing multiple critical business applications and Unified Communications in Citrix environments.
Posted: 03 Nov 2015 | Premieres: Dec 3, 2015

Citrix and Netscout

Beating Back Malicious Mobile Apps
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013


Building the Right Switching Architecture for New Business-Critical Applications
sponsored by Juniper Networks, Inc.
WEBCAST: Watch this webcast to discover how you can simplify your network for an architecture that supports today's IT landscape.
Posted: 26 Mar 2015 | Premiered: Dec 31, 2014

Juniper Networks, Inc.

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013


STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013


Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013


Advanced Threat Protection: Why an Integrated Approach is Your Game Changer
sponsored by Fortinet, Inc.
WEBCAST: This brief webcast explores a tri-layered security approach that integrates sandboxing with more traditional technologies to thwart hidden threats. View now to learn how to effectively use sandboxing technology in your network security strategy.
Posted: 05 Jun 2015 | Premiered: May 20, 2015

Fortinet, Inc.

Simplified Network Security  in 90 Seconds
sponsored by OpenDNS
WEBCAST: View this webcast to learn how to protect users on any device in any location from today's top network security threats such as malware and phishing attacks.
Posted: 14 Oct 2015 | Premiered: Jun 30, 2012


Network Security from the Inside: Understanding the New Model of Firewall
sponsored by Fortinet, Inc.
WEBCAST: This 90-second whiteboard video illustrates how an internal network firewall (INFW) defends data from inside the network. Watch now to uncover the three critical criteria an INFW needs to meet to ensure network security.
Posted: 05 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

NGFW 101: What Is It and Why Should You Care?
sponsored by Fortinet, Inc.
WEBCAST: This webcast presents and explores the basics of next-gen firewalls (NGFW). View now to learn what makes a firewall a next-gen firewall, the challenges and benefits of adopting NGFWs, and more.
Posted: 12 Jun 2015 | Premiered: May 4, 2015

Fortinet, Inc.

SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Acquiring a top-notch compliance management system for SQL Server is no easy task. Fortunately, we can help. Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


It's Not Your Media-Rich Apps, It’s the Network
sponsored by Hewlett Packard Enterprise
VIDEO: When a network is not ready for rich-media apps, productivity suffers. Watch this brief video and learn how to ready your network for these apps and ensure optimal user experience.
Posted: 10 Nov 2015 | Premiered: 15 Jan 2015

Hewlett Packard Enterprise

Strengthening Security From the Inside Out
sponsored by Mimecast
WEBCAST: Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
Posted: 26 Jun 2015 | Premiered: Jun 10, 2015


How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Reducing Network Complexity with a Next Generation Firewall
sponsored by Fortinet, Inc.
WEBCAST: View this brief whiteboard video to learn the additional capabilities next-gen firewalls (NGFW) provide such as application, user, or device control as well as IPS and web filtering. Access this resource now to learn the 3 key requirements to choosing NGFW as well as quick tips for evaluating platforms.
Posted: 10 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013


Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


Security case study: Improving your network visibility
sponsored by Gigamon
VIDEO: This case study introduces a new security approach used by the University of Glasgow, a renowned academic institution, which improves network visibility and security without adding on expensive appliances. View now to learn how to detect and remedy infected endpoints, among other solutions.
Posted: 13 Apr 2015 | Premiered: 25 Feb 2015


Protection Against the Three Vectors of a Healthcare Cyberattack
sponsored by Fortinet, Inc.
WEBCAST: In this webinar, examine the top security threats and vulnerabilities facing healthcare today as well as strategies to overcome these challenges.
Posted: 12 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013


Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement