IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat Management Multimedia (View All Report Types)
 
Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.
Posted: 09 Oct 2017 | Premiered: 09 Oct 2017

SearchSecurity.com

Webinar: IT Trends 2017
sponsored by Snow Software
WEBCAST: With the current transformation of the business world, IT needs to find a way to operate on a tighter budget. This is where software asset management (SAM) comes in. Watch this webcast to learn the role SAM is going to play through 2020 and how it relieves the strain brought on by the growing IT-business gap.
Posted: 07 Jun 2017 | Premiered: Jun 5, 2017

Snow Software

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
PODCAST: 50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

IT Security and the Devops Environment
sponsored by CyberArk Software, Inc
WEBCAST: DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.
Posted: 19 Sep 2017 | Premiered: Sep 19, 2017

CyberArk Software, Inc

IT Managers Survival Guide for Moving Your Fax Infrastructure to the Cloud Webinar
sponsored by J2 Cloud Services
WEBCAST: In this webinar, listen to Michael Flavin, Senior Product Marketing Manager, j2 Cloud Services about common misconceptions about cloud computing and the 10 key questions your organization should be asking when evaluating cloud providers.
Posted: 14 Sep 2017 | Premiered: Jun 4, 2015

J2 Cloud Services

The Business of IT Transformation
sponsored by Rackspace
WEBCAST: Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect the term "digital transformation" and highlight the challenges driving businesses like yours to the cloud. They also run down an actionable cloud implementation checklist, for you to use as guidance.
Posted: 13 Oct 2017 | Premiered: Mar 29, 2017

Rackspace

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement