IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Packet Monkey

RSS Feed    Add to Google    Add to My Yahoo!
Packet Monkey Multimedia (View All Report Types)
 
WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

The Cloud Is Your World
sponsored by IBM
VIDEO: Discover how to efficiently utilize space in your growing company while bringing it top performance with the cloud.
Posted: 01 Jul 2016 | Premiered: 01 Jul 2016

TOPICS:  IT Management
IBM

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Creating a Ready-for-Digital infrastructure with Axway API Gateway
sponsored by Axway
WEBCAST: Discover how Scania found a simple, secure way to move applications between zones. Explore the capabilities of the API gateway they adopted and how it streamlined their day-to-day operations.
Posted: 09 Jun 2016 | Premiered: Feb 11, 2016

Axway

Remote Systems Monitoring for Power and Cooling
sponsored by Emerson Network Power
VIDEO: Discover in this video how to leverage data center remote monitoring to evaluate the health and status of your critical power and cooling equipment. Tune in to capture critical system performance data and turn it into actionable insights with alarm notifications, custom escalation plans, and proactive diagnostics.
Posted: 07 Jun 2016 | Premiered: 19 Jan 2011

Emerson Network Power

Is Hyperconvergence a Viable Alternative to the Public Cloud?
sponsored by SimpliVity
WEBCAST: This feature webcast takes a look at some of the comparisons between legacy IT and cloud. It also examines some of the pressures, challenges and solutions that the cloud is supposed to bring to your IT infrastructure.
Posted: 19 Jul 2016 | Premiered: May 3, 2016

SimpliVity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement