IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Red Team

RSS Feed    Add to Google    Add to My Yahoo!
Red Team Multimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Redefining converged infrastructures with Vscale architechture
sponsored by VCE
VIDEO: Inside this brief video, learn about an architecture that is extending converged infrastructure design to scale-up and scale-out data centers. Find out how this architecture grows when needed and enables optimized on-demand resource sharing for applications across systems or data center.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

VCE

The Benefits of Cloud Mobility Management
sponsored by BlackBerry
WEBCAST: In this webcast, discover how cloud EMM works and what benefits it provides.
Posted: 24 Apr 2015 | Premiered: Apr 9, 2015

BlackBerry

How to Bring Cyberthreat Management to the C-Suite
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses how you can bring security to the boardroom with effective and proactive security leadership.
Posted: 27 Mar 2015 | Premiered: Dec 2, 2014

SurfWatch Labs

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett-Packard Company
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

Virtual Instruments

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement