IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security ArchitectureMultimedia (View All Report Types)
 
Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Peer Perspectives: Top Drivers, Requirements and Selection Criteria for NGFWs
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.

Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

HP Mobile Application Security
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett-Packard Company

Video: Amazon Web Services API Security Overview
sponsored by Intel
WEBCAST: Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
Posted: 27 Aug 2013 | Premiered: Aug 27, 2013

Intel

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Virtualization Podcasts: Infrastructure Solutions for Midsized Companies
sponsored by IBM
PODCAST: Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.
Posted: 18 Feb 2009 | Premiered: Feb 18, 2009

IBM

5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST: Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)

Lumeta Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement