IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Mobile Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Mobile Messaging Multimedia (View All Report Types)
 
How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Boost Your Hyper Converged Solution's Speed with Cloud
sponsored by Prosys- HPE
WEBCAST: Watch this 1 minute webcast to learn how hyper converged platforms enable IT generalists, rather than specialists, to manage your VMs regardless of your staff resources.
Posted: 23 Feb 2017 | Premiered: Feb 23, 2017

Prosys- HPE

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Why Mobile Devices are the Biggest Enterprise Security Threat
sponsored by BlackBerry
WEBCAST: Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.
Posted: 23 Jan 2017 | Premiered: Oct 31, 2016

BlackBerry

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
PODCAST: Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.
Posted: 21 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Video Part 1: Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS provides security questions to ask when vetting a cloud service or SaaS provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

State-of-the-art Technology Exceeds Customer Expectations
sponsored by NetApp
WEBCAST: Discover how NetApp All Flash FAS enables businesses to enrich the end-user experience and operate more competitively.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

TOPICS:  IT Management
NetApp

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Intrusion Prevention Systems Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Magic Quadrant for Enterprise Data Loss Prevention
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Enterprise Data Loss Prevention Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement