IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresMultimedia (View All Report Types)
 
Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Security Assessment Team Helps Hospital Revamp their Security Infrastructure
sponsored by CDW Corporation
VIDEO: Find out what a security assessment team found after evaluating a hospital's security infrastructure, policies and procedures.
Posted: 02 Oct 2014 | Premiered: 02 Oct 2014

CDW Corporation

The Convergence of Physical and Logical Access
sponsored by HID
WEBCAST: This webcast explores the convergence of physical and logical access with a single access card, as well as managing and reporting through a single portal.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

Plan Your Path to a Virtual Private Cloud
sponsored by Juniper Networks, Inc.
WEBCAST: This exclusive webcast will help you create a sound strategy for migrating to the private cloud.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

Juniper Networks, Inc.

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Case study: Benefits of IT operations outsourcing
sponsored by Peak 10
VIDEO: An in-house IT infrastructure is a huge responsibility -- even a burden, especially when you don't have enough IT staff to support it. In this brief video, discover how TexMac turned to outsourcing for their IT operations.
Posted: 09 Oct 2014 | Premiered: 25 Aug 2014

Peak 10

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

CDW’s Threat Check Assessment
sponsored by CDW Corporation
WEBCAST: This exclusive webcast breaks down the current malware landscape and explores an assessment tool that will help you identify malware in your network now and protect you in the future.
Posted: 07 Oct 2014 | Premiered: Apr 8, 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement