IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Wireless Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Wireless Messaging Multimedia (View All Report Types)
How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Video: Managing an Efficient Data Center
sponsored by IBM
VIDEO: This video explores a managed services strategy that can eliminate the challenges of maintaining and managing your data center infrastructure so you can focus on creating innovative solutions.
Posted: 11 Nov 2015 | Premiered: 06 Jan 2014


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


Brian Madden and John Gobron Talk Virtualization in Healthcare
sponsored by Aventura
WEBCAST: In this webcast, independent analyst and blogger Brian Madden hosts as he discusses VDI and desktop virtualization with healthcare technology provider CEO John Gobron. Tune in and you'll also learn how to apply situational awareness to virtualized environments.
Posted: 14 Oct 2015 | Premiered: Oct 14, 2015


Enhance your Enterprise's IAM
sponsored by
VIRTUAL ENVIRONMENT: This virtual environment explores how you can implement advanced IAM to prevent hacks from coming through third-party vendors and other vulnerable spots.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast introduces social threat intelligence (STI), an approach to security that allows inter-enterprise threat intelligence sourcing for heightened security.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


Luxury Phone Manufacturer Uses Operational Metrics to Meet Customer Expectations
sponsored by Splunk
VIDEO: In this webcast, learn how luxury phone manufacturer Vertu leveraged operational analytics to improve their software reliability. Discover how they automated feedback from product testers and gained visibility so that software quality could be tracked over time.
Posted: 28 Oct 2015 | Premiered: 28 Oct 2015


Single Sign-On: Past, Present, and Future
sponsored by Centrify Corporation
WEBCAST: Join Pete Lindstrom, Research Director for IDC's Security Products program, and Chris Webber, Security Strategist with Centrify, to learn how the lessons of the past can help IT springboard into the future of Identity.
Posted: 22 Oct 2015 | Premiered: Mar 16, 2015

Centrify Corporation

Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement