Vertical Industries  >  

Schools

RSS Feed    Add to Google    Add to My Yahoo!
SchoolsMultimedia (View All Report Types)
 
One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

VDI Tech Talk with Fresno County Office of Education
sponsored by Unidesk Corporation
VIDEO: Fresno County Office of Education IT specialists share their experience with VDI implementation, take you on a tour of FCOE's virtual environment, and answer your technical questions about VMware Horizon View, Unidesk, Active Directory, and more.
Posted: 28 Jul 2014 | Premiered: 24 Apr 2014

Unidesk Corporation

HP SchoolCloud: Education Solution
sponsored by Hewlett-Packard Company
VIDEO: Access this essential webcast to learn more about how the education industry is using cloud computing and virtualization. Learn how to empower your educators while creating a personalized learning environment for your students.
Posted: 22 Feb 2012 | Premiered: 22 Feb 2012

Hewlett-Packard Company

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Vulnerability Management Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: How do you win a losing battle—in this case, the battle of vulnerability management? Whether it's Java or Adobe or something you never previously heard of, let's face it: the battle against system vulnerabilities is a losing one.
Posted: 14 Jul 2014 | Premiered: 15 Jul 2014

SearchSecurity.com

Cloud Security Services Security School
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This Cloud Security classroom looks at the most significant developments and discusses the action plans security pros should consider to get the most mileage out of cloud-based security services.
Posted: 09 Oct 2014 | Premiered: 15 Oct 2014

TOPICS:  Cloud Security
SearchCloudSecurity.com

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Integrating SIEM and Incident Response Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores how to enhance and extend SIEM technology to effectively support incident response.
Posted: 14 May 2014 | Premiered: 14 May 2014

SearchSecurity.com

Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

SearchSecurity.com

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

VDI in 4 Months: USC School of Medicine Greenville Shares How
sponsored by Unidesk Corporation
VIDEO: You don't often hear about IT projects coming in ahead of schedule. But USC School of Medicine Greenville was able to fully virtualize its servers, desktops, and apps in 4 months - and deploy VDI 6 months ahead of schedule. Watch and find out how they did it.
Posted: 25 Jul 2014 | Premiered: 25 Jul 2014

Unidesk Corporation

Cloud-based Identity and Access Management Security School
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn about the advantages of a cloud-centric identity and access management (IAM).
Posted: 25 Sep 2014 | Premiered: 25 Sep 2014

TOPICS:  Cloud Security
SearchCloudSecurity.com

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Best of Wi-Fi Use Cases
sponsored by Ruckus Wireless
WEBCAST: Wi-Fi networks are a must-have in every organization today, especially if your company has guests who need to connect frequently.  Whether it be a school, hotel, or an office, the best wireless experience is a priority.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

Ruckus Wireless

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Hybrid Clouds: Pulling It All Together
sponsored by SearchCloudComputing.com
VIRTUAL ENVIRONMENT: This classroom examines the benefits and limitations of the hybrid cloud model. Included is a webcast on the practical differences between public, private and hybrid clouds. A podcast explores the interoperability issues users face when moving workloads among clouds. Other guidance is offered on how how to effectively manage a hybrid cloud.
Posted: 13 Aug 2013 | Premiered: 15 Aug 2013

SearchCloudComputing.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

SearchSecurity.com University: Web-bourne Malware
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson examines trends in Web-borne malware, including contemporary attacker and malware trends, and recent cutting-edge attack methods, and details the technologies and tactics enterprises can put in place to achieve "quick wins" to reduce malware risk and long-term strategies to harden browsers, enhance detection and educate users.
Posted: 14 Jan 2014 | Premiered: 15 Jan 2014

SearchSecurity.com

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

Bridging the IT Operations-Application Owner Gap
sponsored by VMTurbo
WEBCAST: This exclusive whitepaper provides in-depth look at the challenges creating the division between infrastructure managers and application owners, each side's point of view, a solution that can close the gap and more.
Posted: 22 Aug 2014 | Premiered: Aug 22, 2014

VMTurbo
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement