Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best PracticesMultimedia (View All Report Types)
1 - 25 of 132 Matches Previous Page  | Next Page
Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Big Ideas, Big Tech: Tackling Oracle Backup in the Face of Massive Data Growth
sponsored by EMC Corporation
WEBCAST: As the criticality and quantity of data continues to grow, the gap between DBA and the Backup Administrator increase further. DBAs want to rely on their own backup rather than waiting for an administrator, while administrators complete tasks in the most efficient way possible.
Posted: 15 Sep 2014 | Premiered: Sep 15, 2014

EMC Corporation

Streamline Your Federal Contingency Planning/COOP
sponsored by RSA, The Security Division of EMC
WEBCAST: Learn how to streamline your COOP with an automated and integrated solution. Understand the nuances of the terminology and align with best practices such as NIST 800-34. Align recovery efforts with organizational objectives and priorities.
Posted: 05 Sep 2014 | Premiered: Sep 5, 2014

RSA, The Security Division of EMC

What Does the Future Hold for Managed File Transfer?
sponsored by IBM
WEBCAST: This webcast investigates the future of managed file transfer due to the evolving digital universe.
Posted: 15 Aug 2014 | Premiered: Aug 15, 2014

IBM

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

10 Questions CISOs Should Ask About Mobile Security
sponsored by Bluebox
WEBCAST: This webcast reveals the answers to 10 questions CISOs should ask about mobile security.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
PODCAST: Tune in to this informative podcast to gain crucial information about managed security solutions, and how they can help you monitor threats and prevent data breaches in your enterprise.
Posted: 13 Aug 2014 | Premiered: Aug 5, 2014

NEC Corporation of America

The One-Man SOC: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WEBCAST: This informative webinar discusses the best practices of top security practitioners.
Posted: 11 Aug 2014 | Premiered: Aug 11, 2014

AlienVault

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Using the Latest Technology Trends to Stay Secure and Risk Free
sponsored by DLT Solutions
WEBCAST: Access this webcast to get an insider perspective for maintaining security when operating in the public sector.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

DLT Solutions

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Real-World Security Testing: Why Industry Experts Say it's Essential
sponsored by Fortinet, Inc.
WEBCAST: Tune in to this webinar to separate the facts from hype as industry experts examine how organizations can best bolster their IT defense, and why real-world testing is a critical part of any security solution. W
Posted: 31 Jul 2014 | Premiered: May 7, 2014

Fortinet, Inc.

New Software Solution provides Real-Time Threat Detection and Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

Practical Solutions for Threat Management and Incident Response
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Is Your Organization Safe from Advanced Persistent Threats?
sponsored by CDW Corporation
VIDEO: This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: 22 Jul 2014 | Premiered: 21 May 2014

CDW Corporation

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

How Conventional Security Tools Expose Modern Data Centers to Cyber Threats
sponsored by CDW Corporation
WEBCAST: This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.
Posted: 21 Jul 2014 | Premiered: Jun 17, 2014

CDW Corporation

New Strategies for Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

Complete your Vulnerability Management Strategy with Threat Intelligence
sponsored by AlienVault
WEBCAST: This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

AlienVault

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
1 - 25 of 132 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement