IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

PKE

RSS Feed    Add to Google    Add to My Yahoo!
PKEMultimedia (View All Report Types)
 
The Role of Third-Party Applications in APT
sponsored by Lumension
WEBCAST: This valuable webcast explores how criminals are using advanced persistent threats to penetrate organizations defenses for weeks at a time.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Security Assessment Team Helps Hospital Revamp their Security Infrastructure
sponsored by CDW Corporation
VIDEO: Find out what a security assessment team found after evaluating a hospital's security infrastructure, policies and procedures.
Posted: 02 Oct 2014 | Premiered: 02 Oct 2014

CDW Corporation

The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
sponsored by AlienVault
WEBCAST: This exclusive webcast covers a unified security management platform that will protect your end-users from watering hole attacks.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Five Fundamental Network Security Tips
sponsored by CDW Corporation
VIDEO: This video reveals five critical tips that companies should use to enhance their network security.
Posted: 28 Oct 2014 | Premiered: 06 Oct 2014

CDW Corporation

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Meet the N-able product family
sponsored by N-able Technologies
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

N-able Technologies

CDW’s Threat Check Assessment
sponsored by CDW Corporation
WEBCAST: This exclusive webcast breaks down the current malware landscape and explores an assessment tool that will help you identify malware in your network now and protect you in the future.
Posted: 07 Oct 2014 | Premiered: Apr 8, 2014

CDW Corporation

Lessons Learned from the Target Data Breach
sponsored by Lumension
WEBCAST: This exclusive webcast explores key lessons learned from the high-profile security breaches in 2013.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement