IT Management  >   Systems Design and Development  >   Architectures  >  

Security Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Security Architecture Multimedia (View All Report Types)
 
Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Cybersecurity truth: Protection isn't enough
sponsored by Verizon
VIDEO: Access this short video to learn about improving your incident response time, and to gain access to the 2016 Data Breach Investigation Report.
Posted: 05 Jul 2016 | Premiered: 02 May 2016

Verizon

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.

CA Compliance Manager for z/OS
sponsored by CA Technologies.
WEBCAST: Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk.
Posted: 12 May 2009 | Premiered: May 12, 2009

CA Technologies.

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Windows Azure Platform Security Essentials for Technical Decision Makers
sponsored by Microsoft
WEBCAST: In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform.
Posted: 01 Dec 2010 | Premiered: Dec 1, 2010

Microsoft

Mobile Security: Containerizing Enterprise Data
sponsored by Code42
WEBCAST: Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.
Posted: 01 Nov 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement