IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security InfrastructureMultimedia (View All Report Types)
51 - 62 of 62 Matches Previous Page  |  Next Page
Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud
sponsored by Intel
PODCAST: Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.
Posted: 12 Oct 2011 | Premiered: Oct 11, 2011

Intel

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
sponsored by Intel
WEBCAST: This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
Posted: 04 Oct 2011 | Premiered: Oct 4, 2011

Intel

Shutting the Door on Data Theft
sponsored by Websense, Inc.
WEBCAST: Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.
Posted: 15 Sep 2011 | Premiered: Sep 15, 2011

Websense, Inc.

Videocast: Considerations for Choosing Cloud Backup Hosting Services
sponsored by KineticD
VIDEO: Cloud backup for physical and virtual environments is becoming more and more important for SMBs. Gartner predicts that by 2012, Vendor Lock-in will surpass security as the biggest obstacle to cloud computing. Vendors are trying to lock-in and maintain their customers forever, not allowing them the flexibility and mobility SMBs require.
Posted: 29 Jun 2011 | Premiered: 28 Jun 2011

KineticD

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini

New Podcast: Adding Context to Security Alerts
sponsored by Solera Networks
PODCAST: In this podcast you’ll learn how network forensics can integrate with other security tools to provide context to any alert.
Posted: 16 Apr 2010 | Premiered: Apr 16, 2010

Solera Networks

This Month in the Threat Webscape for July 2009
sponsored by Websense, Inc.
VIDEO: In this video, learn more about the top techniques for defending your organization from Web threats. Techniques include the monitoring, classification, and identification of all Web content in real time.
Posted: 02 Sep 2009 | Premiered: 01 Sep 2009

Websense, Inc.

CA Compliance Manager for z/OS
sponsored by CA Technologies.
WEBCAST: Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk.
Posted: 12 May 2009 | Premiered: May 12, 2009

CA Technologies.

Video - Vulnerability Management in a Web 2.0 World
sponsored by Lumension
VIDEOCAST: Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Posted: 28 Jan 2009 | Premiered: Jan 28, 2009

Lumension

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers
sponsored by Sendmail, Inc.
PODCAST: This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM
51 - 62 of 62 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement