IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Remote Access Policies

RSS Feed    Add to Google    Add to My Yahoo!
Remote Access Policies Multimedia (View All Report Types)
 
Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

Application Security Viewpoint
sponsored by Ounce Labs, an IBM Company
PODCAST: Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.
Posted: 03 Feb 2010 | Premiered: Feb 3, 2010

Ounce Labs, an IBM Company

Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016

AlienVault

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Ethical Hacking and Risk Assessments
sponsored by Global Knowledge
WEBCAST: Attend this webcast to learn about risk assessment process and tools used by ethical hackers.
Posted: 10 Dec 2008 | Premiered: Dec 10, 2008

Global Knowledge

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement