IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  


RSS Feed    Add to Google    Add to My Yahoo!
PKE Multimedia (View All Report Types)
How to Optimize Your Legacy Data Center
sponsored by Hewlett Packard Enterprise & SUSE
WEBCAST: This webcast explores top considerations for migrating from inefficient, legacy environments in your data center to modern platforms. Tune in to learn how you can gain the most ROI and benefit from this transition.
Posted: 10 Nov 2015 | Premiered: Nov 3, 2015

Hewlett Packard Enterprise & SUSE

Do You Trust Your Cloud?
sponsored by Intel and IBM
WEBCAST: This brief video examines how to gain control and transparency over your cloud infrastructure to minimize data loss and breaches. View now to learn how to remain compliant and maintain an auditable trail.
Posted: 09 Sep 2015 | Premiered: Aug 5, 2015

Intel and IBM

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO: This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015


Leveraging IT Trends: The Benefits and Challenges of Cloud Outsourcing
sponsored by Dell, Inc.
WEBCAST: In this webcast, Guy Currier, Director of Global Cloud Solutions Marketing at Dell, addresses how to leverage the new IT trends concerning cloud sourcing, and the benefits and challenges contained therein. View now to see why companies are placing a high stake in service-centric automation.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

Dell, Inc.

Making "Things" Secure: Towards a Safer Internet of Things
sponsored by Symantec Corporation
WEBCAST: This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Security into an IoT Device: Why & How?
sponsored by Inside Secure
WEBCAST: This webinar on December 8th will provide the valuable information needed to help you to understand just what the main IoT security concerns are and what to do about it. Sign up to this free webinar before November 30th and receive a free IoT Security for Dummies Book to download in December.
Posted: 19 Nov 2015 | Premieres: Dec 8, 2015

Inside Secure

Why Innovation Matters: Discussing 8x8's Patents and Technologies
sponsored by 8x8, Inc.
VIDEO: Watch this informative webcast to hear executives from 8x8 reflect on their culture of innovation and discuss why it matters to customers and to the cloud communications industry. You'll find out how their patents and technologies have changed the business communications market.
Posted: 23 Nov 2015 | Premiered: 22 Jan 2015

8x8, Inc.

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Discovering the New Business Case for Cybersecurity
sponsored by Symantec Corporation
WEBCAST: This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement