IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Multimedia (View All Report Types)
1 - 25 of 88 Matches Previous Page  |  Next Page
Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

Web App Firewall Evaluations: Get the Results and Hear Customer Insights
sponsored by Imperva
WEBCAST: This 2016 analysis for web application firewall (WAF) tools reviews 16 vendors and is based on detailed responses to questionnaires from experienced WAF customers. Uncover the experiences of participants in this research, and how they implemented WAF technologies to protect their applications and critical data.
Posted: 15 Nov 2016 | Premiered: Aug 26, 2016

Imperva

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.

How SAIC Empowers Its Security Operations Center with Splunk
sponsored by Splunk
WEBCAST: In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.
Posted: 09 Nov 2016 | Premiered: Nov 9, 2016

Splunk

Best Practices to Securing the Cloud and SDDC
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.
Posted: 08 Nov 2016 | Premiered: Sep 30, 2016

Check Point Software Technologies Ltd.

The New Generation of Network Security
sponsored by Juniper Networks, Inc.
WEBCAST: Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.
Posted: 07 Nov 2016 | Premiered: Nov 7, 2016

Juniper Networks, Inc.

Juniper Networks Security Director
sponsored by Juniper Networks, Inc.
WEBCAST: Learn how to improve your organization's threat detection while employing intuitive firewall controls while gaining deep visibility into your network's traffic. Access now to discover how to make your enterprise's security run smoothly and more effectively than ever.
Posted: 04 Nov 2016 | Premiered: Nov 4, 2016

Juniper Networks, Inc.

Ransomware, Phishing and APTs: What Can be Done
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

SAN 2016 Incident Response Survey: The Current Threat Landscape
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Gatwick Airport Drives Security Efficiency with SIM Cloud Platform
sponsored by Splunk
WEBCAST: Discover how Gatwick Airport utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield. Learn how to utilize the cloud to soar to success with superior and secure business performance.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Splunk

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode
1 - 25 of 88 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement