IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Multimedia (View All Report Types)
1 - 25 of 55 Matches Previous Page  |  Next Page
Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Secure Your Private Cloud Infrastructure
sponsored by Oracle Corporation
WEBCAST: In this webcast, take a closer look at one private cloud infrastructure and how it can help you protect your sensitive data.
Posted: 17 Nov 2015 | Premiered: Nov 11, 2015

Oracle Corporation

Threat Intelligence Networks: The Next Generation
sponsored by Symantec Corporation
WEBCAST: This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


The Cloud is Casting a Shadow Over IT
sponsored by Centrify Corporation
WEBCAST: In the following webinar, join Chris Christiansen, Program Vice President for IDC's Security Product and Services Group, and Chris Webber, Security Strategist from Centrify, as they discuss shadow IT and the many problems it can bring to the table. Tune in now and uncover insights into how to overcome these issues.
Posted: 23 Oct 2015 | Premiered: Oct 23, 2015

Centrify Corporation

App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger, CEO of Starmobile, joins Brian Madden to hash out app refactoring. They discuss how to extend application virtualization, and capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015


Next-Generation Firewalls: Breaking Through the Hype
sponsored by
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Enterprise
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Enterprise

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Understanding Big Data and Security
sponsored by Hewlett-Packard Enterprise
WEBCAST: This informative resource explores the role of security in today's IT landscape and how IT departments are shifting focus to ensure better security and more accessibility.
Posted: 25 Feb 2014 | Premiered: Apr 16, 2013

Hewlett-Packard Enterprise

Collaboration: Delivering a More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Enterprise
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Enterprise

IT Security Challenges: Interview with Brian Glick and HPE
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this webcast, learn how to deal with security threats proactively and better understand the importance of becoming familiar with your IT's own vulnerabilities in infrastructure and applications so you're able to monitor and manage security optimally.
Posted: 07 Feb 2014 | Premiered: Feb 7, 2014

Hewlett-Packard Enterprise

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014


Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

1 - 25 of 55 Matches Previous Page    1 2 3    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement