IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Threat Management Multimedia (View All Report Types)
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Converged System Revs Up App Performance
sponsored by IBM
VIDEO: Make infrastructure deployment easy, efficient and versatile: Tune into this brief video to discover how integrated, converged infrastructure delivers faster and more reliable execution of business apps with the versatility to adapt as priorities change.
Posted: 21 Oct 2016 | Premiered: 31 Jul 2015


Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Don't Get Taken for a Ride: Finding the Right Hyperconverged Solution
sponsored by Hewlett Packard Enterprise
VIDEO: Tune into this video to find out how implementing a hyperconverged system in your data center can simplify and speed your IT infrastructure while lowering costs and accelerating the pace of your business. View now to use HCI to quickly add capacity to your infrastructure, and manage the rollercoaster of demands in today's digital economy.
Posted: 23 Jun 2016 | Premiered: 30 May 2016

Hewlett Packard Enterprise

Customer Story: Why I Invest in Next-Gen Tech
sponsored by Rubrik
WEBCAST: Matt Day, IT Manager at Langs Building Supplies, discusses his approach to transforming the data center, covers the real world challenges he has faced and shares the lessons he has learned in deploying next-gen technologies.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016


Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

Fast Track Your Office 365 Deployment and Beyond
sponsored by OneLogin
WEBCAST: Access this informative webinar, featuring EMM industry leader SOTI, to discover hidden Office 365 roadblocks and headaches, how to automate on-and off-boarding of users in real time to achieve both business agility and security, and how SOTI quickly deployed Office 365 and achieved ROI in just one week.
Posted: 26 Aug 2016 | Premiered: Jul 1, 2016


SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement