IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Mobile Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Mobile Messaging Multimedia (View All Report Types)
 
Cherwell Service Management Product Overview Video
sponsored by Cherwell
VIDEO: If you organization is looking to implement, update, or automate ITSM, watch this brief video to learn about Cherwell Service Management software and its key features, including out of the box ITIL certified processes, a modern, intuitive self-service portal, codeless technology, and more.
Posted: 12 Apr 2017 | Premiered: 06 Sep 2016

Cherwell

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

Securely Bridge Traditional and Cloud Application Environments
sponsored by A10 Networks
WEBCAST: Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.
Posted: 13 Feb 2017 | Premiered: Feb 13, 2017

A10 Networks

Power of Proxy in Security
sponsored by Symantec & Blue Coat Systems
WEBCAST: With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threat, the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017

Symantec & Blue Coat Systems

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Banking - Analytics Drive Banking Innovations, Better Customer Service
sponsored by Hewlett-Packard Enterprise
VIDEO: See how the use of real-time data is creating new opportunities for banking enterprises—and their customers.
Posted: 17 Oct 2016 | Premiered: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Consider These Use Cases When Selecting Your MFT Technology
sponsored by IBM
WEBCAST: Gartner shares the key challenges and recommendations in selecting the right MFT solution for your organization.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Transform Your Data With a Single Solution
sponsored by IBM
WEBCAST: Avoid increase costs and delayed projects. Learn how to deploy a single transformation solution across your enterprise.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Explore SIEM in the Cloud
sponsored by Splunk
WEBCAST: Explore SIEM in the Cloud
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement