IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed    Add to Google    Add to My Yahoo!
Threat MitigationMultimedia (View All Report Types)
 
Diary of a Healthcare CISO
sponsored by Core Security Technologies
WEBCAST: This exclusive webcast explores the most pressing challenges and security risks in the healthcare information security landscape today.
Posted: 15 Dec 2014 | Premiered: Dec 15, 2014

Core Security Technologies

Security Solutions for the Application Economy
sponsored by CA Technologies.
VIDEO: This video explores a leading solution for securing users's identities across all applications and devices.
Posted: 06 Nov 2014 | Premiered: 06 Nov 2014

CA Technologies.

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Establish State-of-Art Security Using Advanced Analytics
sponsored by RSA
VIDEO: Bob Cheong, CISO of LA World Airports, discusses why RSA Security Analytics and RSA ECAT are key components of his state-of-the-art security operations center (SOC).
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Five Fundamental Network Security Tips
sponsored by CDW Corporation
VIDEO: This video reveals five critical tips that companies should use to enhance their network security.
Posted: 28 Oct 2014 | Premiered: 06 Oct 2014

CDW Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement