IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Smurf

RSS Feed    Add to Google    Add to My Yahoo!
Smurf Multimedia (View All Report Types)
 
2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Distil Networks 2015 Bad Bot Report: 5 High-Risk Lessons
sponsored by Distil Networks
WEBCAST: Distil Networks has produced IT Security's most in-depth analysis on the sources, types and sophistication levels of last year's bot attacks. Listen to this exclusive webcast to keep your organization safe.
Posted: 11 May 2015 | Premiered: May 15, 2015

Distil Networks

How Well Does SIEM Actually Secure Your Organization?
sponsored by Splunk
WEBCAST: This brief webcast examines how SIEMs only alert you of security threats when an attack is detected, but not when they sneak past your perimeter security.
Posted: 31 Aug 2015 | Premiered: Jan 17, 2014

Splunk

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Strategies for Controlling Email Risks with Declining Budgets
sponsored by Proofpoint, Inc.
VIDEO: Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.
Posted: 18 Sep 2009 | Premiered: 16 Sep 2009

Proofpoint, Inc.

Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014

Splunk

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

ASG- Perfman: Health Insurance Provider
sponsored by ASG
VIDEO: This video examines how a major healthcare provider was able to vastly improve their ability to analyze and react to short-term and historical data by deploying Perfman.
Posted: 21 Aug 2015 | Premiered: 21 Aug 2015

ASG
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement