IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Multimedia (View All Report Types)
1 - 25 of 90 Matches Previous Page  |  Next Page
The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Strong Enough for Today's Threats
sponsored by IBM
VIDEO: In this brief video, discover the essential components of a security system strong enough for today's threat landscape.
Posted: 21 May 2015 | Premiered: 09 Sep 2014

IBM

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

What to Do When Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Anatomy of Cyber Attack
sponsored by Hewlett-Packard Company
WEBCAST: Attend this webinar to learn the anatomy of an advanced persistent threat and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Posted: 06 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Protect Your Enterprise with Security Monitoring
sponsored by Hewlett-Packard Limited
VIDEO: This brief video introduces a security monitoring system that effectively detects and stops risks.
Posted: 06 Apr 2015 | Premiered: 16 May 2014

Hewlett-Packard Limited

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Unseen Challenges in Protecting Corporate Credentials
sponsored by IBM
WEBCAST: Tune in to this critical webinar to hear Eve Maler, Principal Analyst at Forrester Research, Inc., and Trusteer's Christopher Beier expose the common mistakes that cause corporate credential breaches, and explain how you can better fortify your employee's credentials against these attacks.
Posted: 01 Aug 2014 | Premiered: Mar 13, 2014

IBM

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this video, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.
1 - 25 of 90 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement