IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Multimedia (View All Report Types)
Walk Through a Network Virtualization Platform
sponsored by VMware
VIDEO: This series of videos walks you through a network virtualization platform that features network and security services attached to VMs, all with a policy-driven approach.
Posted: 19 Aug 2015 | Premiered: 19 Aug 2015


Enterprise Mobility University: Mobile Device Management and BYOD Classroom
sponsored by
VIRTUAL ENVIRONMENT: This classroom will provide a mobile landscape overview, along with strategies for staying afloat in this BYOD era.
Posted: 06 Sep 2013 | Premiered: 16 Aug 2013

Accelerate WAN Optimization with a Cloud-Based Approach
sponsored by Citrix
VIDEO: In this brief video, join Gopinath Durairaj and Rachna Srivastava from Citrix to discuss a smarter approach to WAN optimization, one which compresses the amount of network traffic to streamline your app performance. Watch now to optimize your WAN for accelerated productivity.
Posted: 18 Sep 2015 | Premiered: 28 Jan 2014


A Cloud-Enabled Communications Case Study: Platinum Partners
sponsored by ThinkingPhones
WEBCAST: In this webcast, Paul Poteat, Chief Technology Officer at Platinum Partners, briefly discusses how his organization accelerated its enterprise mobility with cloud communications services. View this video now to learn how to drive intelligent communications in your enterprise, using a cloud-enabled collaboration platform.
Posted: 01 Sep 2015 | Premiered: Jul 28, 2015


Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
Posted: 04 Apr 2014 | Premiered: 05 Feb 2014

Cisco Systems, Inc.

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)


AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Managementâ„¢ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement