IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Threat Management Multimedia (View All Report Types)
 
Application Control: Monitoring, Visibility and More
sponsored by Viewfinity
WEBCAST: This webcast discusses integrated and multifaceted methods of keeping business applications safe.
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

Viewfinity

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

2015 Cybersecurity Legislation
sponsored by ESET
WEBCAST: This webcast gives you the background you need on proposed cybercrime laws and how they impact you.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Envisioning and Enabling the Next Generation Enterprise
sponsored by Jive Software
WEBCAST: This webcast covers what it takes to envision and enable a next generation enterprise by considering much of the new technology that is flowing through the market. Learn how the CIO must change and adapt to meet new technology pressures and ultimately, give way to the next generation enterprise.
Posted: 17 Feb 2015 | Premiered: Feb 17, 2015

Jive Software

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Security implications of printers and imaging centers
sponsored by Hewlett-Packard Limited
WEBCAST: The following webcast examines the security concerns surrounding print and document services and delves into the insights of 2 industry experts as they reveal their solutions to print and document service security in today's vast market.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement