IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Packet Monkey

RSS Feed    Add to Google    Add to My Yahoo!
Packet Monkey Multimedia (View All Report Types)
 
The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Arresting Data Sprawl with HCI
sponsored by Pivot3
PODCAST: Listen to this podcast to hear from an early adopter of hyperconverged infrastructure as he describes his environment and offers advice to peers considering the deployment of HCI.
Posted: 30 Aug 2016 | Premiered: Aug 22, 2016

Pivot3

Customer Story: Why I Invest in Next-Gen Tech
sponsored by Rubrik
WEBCAST: Matt Day, IT Manager at Langs Building Supplies, discusses his approach to transforming the data center, covers the real world challenges he has faced and shares the lessons he has learned in deploying next-gen technologies.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rubrik

Get Smarter Control of Your Certificates and User Keys Right Now
sponsored by Certified Security Solutions (CSS)
WEBCAST: In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.
Posted: 22 Sep 2016 | Premiered: Jun 22, 2016

Certified Security Solutions (CSS)

The Most Important Things You Need to Know About Enterprise Mobility Management
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement