IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat Management Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Podcast: Ongoing Management of Data Gravity
sponsored by Equinix and Datapipe
PODCAST: With IT staff overworked, business leaders will sometimes go around protocol and seek 3rd party apps to keep their customers satisfied. However, this practice encourages app sprawl making it harder to manage your hybrid cloud environment. Tune in to part 3 of Croteau's presentation to see how to manage hybrid cloud and control app sprawl.
Posted: 14 Jul 2016 | Premiered: Jun 27, 2016

Equinix and Datapipe

DDoS Mitigation Case Study - The Extra Mile
sponsored by Arbor Networks
WEBCAST: Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.
Posted: 18 Aug 2016 | Premiered: Jul 20, 2015

Arbor Networks

Disrupting in the Digital Economy with an API Strategy
sponsored by IBM
WEBCAST: This webcast explores the use of an integrated creation, runtime, management, and security foundation for enterprise grade APIs and microservices. Unlock the value of existing IT investments to speed up development time, power modern digital apps, and expand brand reach.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016

IBM

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Enabling Secure, Customized Identity Management
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to deliver smarter security and more customized services to your customers. Listen in to see how a common identity service for all constituents can improve security and deliver better services to your customers, while saving time and money in administration.
Posted: 08 Aug 2016 | Premiered: Sep 18, 2015

Radiant Logic, Inc.

Eliminating Confusion - Virtualization vs. Private Cloud
sponsored by Stratoscale
WEBCAST: Tune in to this webinar to clear up any cloudiness you may have about the differences between virtualization and cloud computing as well as how they fit in with SDCC and hyperconvergence.
Posted: 17 Jun 2016 | Premiered: Jun 17, 2016

Stratoscale

Data Center Thermal Management Services: A Brief Video
sponsored by Emerson
VIDEO: As energy prices continue to soar, data center managers explore each avenue for reducing energy consumption and cutting costs. Tune into this brief video to strategize your data center thermal management and discover if your IT admins should utilize indirect evaporative freecooling and adiabatic freecooling in your mission-critical facility.
Posted: 10 Jun 2016 | Premiered: 29 Jan 2015

Emerson

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement