IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Mobile Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Mobile Messaging Multimedia (View All Report Types)
 
What mobile policy suits your organisation?
sponsored by IBM MaaS360
WEBCAST: Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Neutralization of a Phishing Attack
sponsored by LogRhythm, Inc.
VIDEO: This video shows you a solution for faster detection and response. Gain unified security intelligence and analytics and end to end threat lifecycle management through this read.
Posted: 01 Mar 2016 | Premiered: 22 Feb 2016

LogRhythm, Inc.

Extending Your IT Infrastructure to the AWS Cloud
sponsored by Amazon Web Services
VIDEO: Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.
Posted: 02 Jun 2016 | Premiered: 13 Feb 2013

Amazon Web Services

The Benefits of Service-Aware CMDB
sponsored by ServiceNow
VIDEO: This brief video explores how Ahold Europe leveraged a service-aware Configuration Management Database (CMDB) strategy to create a single source of truth for IT.
Posted: 25 Feb 2016 | Premiered: 27 Nov 2015

ServiceNow

Eliminating Confusion - Virtualization vs. Private Cloud
sponsored by Stratoscale
WEBCAST: Tune in to this webinar to clear up any cloudiness you may have about the differences between virtualization and cloud computing as well as how they fit in with SDCC and hyperconvergence.
Posted: 17 Jun 2016 | Premiered: Jun 17, 2016

Stratoscale

SALES CLOUD - A Day in the Life of a Modern Sales Organization
sponsored by Oracle Corporation
VIDEO: Find out how cloud sales solutions can help you sell more, learn more and grow more in this video introduction.
Posted: 28 Jan 2016 | Premiered: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

3 Reasons Why Traditional Hyperconvergence Is a Risky Choice
sponsored by Riverbed Technology, Inc.
WEBCAST: Hyperconvergence is a hot trend, but many solutions don't measure up. Learn how the best solutions keep data safer.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement