IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Smurf

RSS Feed    Add to Google    Add to My Yahoo!
Smurf Multimedia (View All Report Types)
 
Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Webinar: Cost-Effectively Replacing Juniper SSL VPNs
sponsored by Array Networks
WEBCAST: View this Webinar, which includes a demo of Array Networks SSL VPN features and capabilities, to learn how to meet future requirements for enterprise-class secure remote and mobile access.
Posted: 18 Jul 2017 | Premiered: Jul 18, 2017

Array Networks

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Unpredictable Humans - Still the weakest link in data security
sponsored by Code42
WEBCAST: 78% of security professionals say the biggest threat to endpoint security is negligent or careless employees who do not follow security policies. Watch this webinar to uncover strategies on how to protect your enterprise while moving data around on mobile devices.
Posted: 05 Sep 2017 | Premiered: Sep 5, 2017

Code42

Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
sponsored by Aruba Networks
WEBCAST: Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network
Posted: 07 Jul 2017 | Premiered: Jun 21, 2017

Aruba Networks

Security Product Overview: Cisco Umbrella
sponsored by Cisco Umbrella
VIDEO: Over 1/2 of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.
Posted: 27 Jul 2017 | Premiered: 11 Nov 2016

Cisco Umbrella

Why Digital Signing and Verification is Paramount in Cross Domain Environments
sponsored by OPSWAT inc
WEBCAST: Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats.
Posted: 22 Aug 2017 | Premiered: Aug 22, 2017


Digital Transformation on Hyperconverged: Improving Availability
sponsored by DataCore and Lenovo
WEBCAST: Tune into this webinar to learn from the National Portrait Gallery in Canberra how to resolve inefficiencies caused by limiting infrastructure with a hyper-converged system that ensures services and apps can be easily added, data is mirrored so individual nodes can be taken offline for maintenance, and more.
Posted: 05 Sep 2017 | Premiered: Sep 5, 2017

DataCore and Lenovo
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement