IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Multimedia (View All Report Types)
 
Get a 30-Day Free Trial of Array's vAPV Virtual Load Balancer
sponsored by Array Networks
TRIAL SOFTWARE: Available for leading hypervisors and public clouds, as well for Array's Network Functions Platforms, Array's virtual load balancing solutions support all of the features and functionality of Array's dedicated hardware appliances.
Posted: 18 Jul 2017 | Premiered: 18 Jul 2017

Array Networks

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

Recovering From a "WannaCry" Infection Without Paying
sponsored by Actifio
PRODUCT DEMO: Did you get hit with a WannaCry ransomware attack? In this, demo, learn how to easily combat a WannaCry attack by using Actifio to restore your file server to a clean point-in-time and recover your files, without paying any ransom.
Posted: 12 Jul 2017 | Premiered: 12 Jul 2017

Actifio

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016

Prelert

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Borderless Networks: Innovation is Everywhere
sponsored by Cisco Systems, Inc.
WEBCAST: Cisco Borderless Networks includes video, trusted security, and mobility solutions that integrate wired and wireless technologies. Learn about the latest enhancements to Cisco Borderless Networks, including Catalyst access switches, the TrustSec network security solution, and 3900 Series ISR G2 routers.
Posted: 24 Mar 2010 | Premiered: Mar 23, 2010

Cisco Systems, Inc.

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

End-to-End Mobile Device Management
sponsored by Zenprise
WEBCAST: Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.
Posted: 08 Mar 2012 | Premiered: Mar 8, 2012

Zenprise

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement