IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network Multimedia (View All Report Types)
 
Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

Addressing IT Data Challenges in Today's Mobile World
sponsored by CommVault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

CommVault

Sophos EndUser Protection Overview
sponsored by Sophos, Inc.
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos, Inc.

End-to-End Mobile Device Management
sponsored by Zenprise
WEBCAST: Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.
Posted: 08 Mar 2012 | Premiered: Mar 8, 2012

Zenprise

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement