IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed    Add to Google    Add to My Yahoo!
Security AdministrationMultimedia (View All Report Types)
 
Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Webcast: Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014

Hexis Cyber Solutions Inc

Security: Examining the Heartbleed Bug
sponsored by Hewlett-Packard Company
WEBCAST: This exclusive webcast discusses security solution that identifies and addresses bugs in your network that can potentially leak sensitive information. Tune in now to find out more.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Hewlett-Packard Company

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Rethinking Email Security: Best Practices to Protect and Maintain Private Communications
sponsored by Voltage Security, Inc.
WEBCAST: This webcast offers 9 best practices for successful policy-based encryption to improve email security.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Voltage Security, Inc.

Why Enterprises Are Really Deploying NGFWs
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Fortinet, Inc.

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Understanding Big Data and Security
sponsored by Hewlett-Packard Limited
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Limited

Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement