IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Red Teaming

RSS Feed    Add to Google    Add to My Yahoo!
Red TeamingMultimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

HP was the right choice of partner for RoadChef
sponsored by Hewlett-Packard Limited
WEBCAST: Tune into the following video case study to reveal why Roadchef selected HP to help them conquer the biggest IT transformation project they have ever undertaken.
Posted: 11 Aug 2014 | Premiered: Aug 11, 2014

Hewlett-Packard Limited

Making the Shift to a Hybrid Solution
sponsored by FrontRange Solutions Inc.
VIDEO: Investigate the leading provider of hybrid ITSM solutions and integrated client solutions around the world.
Posted: 23 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

Evaluate Your Infrastructure Management Strategy
sponsored by CA Technologies.
SOFTWARE DOWNLOAD: This registration form allows IT professionals considering CA Nimsoft Monitor to request a full trial version of the tool.
Posted: 04 Jun 2014 | Premiered: 04 Jun 2014

CA Technologies.

Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
WEBCAST: IT directors today are asked to manage seemingly limitless amounts of data. Consequently, many organizations are implementing cloud initiatives to better manage this growing problem. But where should IT start? Find out in this on-demand webcast.
Posted: 13 Jun 2014 | Premiered: Jun 13, 2014

Code42

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

Virtual Instruments
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement