IT Management  >   Systems Operations  >   Security  >   Security Management  >  

UTM

RSS Feed    Add to Google    Add to My Yahoo!
UTMMultimedia (View All Report Types)
 
Next-generation spam
sponsored by Trend Micro, Inc.
WEBCAST: This Podcast examines the top 5 alternative technologies enterprises can use in the battle against spam.
Posted: 27 Nov 2007 | Premiered: Nov 27, 2007, 09:00 EST (14:00 GMT)

Trend Micro, Inc.

Countdown: Top 5 technologies to help battle the new spam threat
sponsored by Trend Micro, Inc.
PODCAST: In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.
Posted: 27 Nov 2007 | Premiered: Nov 27, 2007, 09:00 EST (14:00 GMT)

Trend Micro, Inc.

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Free Demo: Powerful and Easy-to-Use Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This complimentary IT download provides a hands-on demonstration of one solution that can patch desktops, data centers, virtual infrastructure and more.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

How to easily secure all of your Windows, Mac, and mobile devices through the cloud
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Click here to test out Sophos cloud for 30 days. With no server to install, you'll be up and running in less than 5 minutes. Learn how this platform will quickly and easily secure all your Windows, Mac and mobile devices through the cloud.
Posted: 17 Sep 2014 | Premiered: 17 Sep 2014

Sophos, Inc.

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Discover What's Possible with Dell Solutions
sponsored by Dell, Inc.
VIDEO: Explore this video to learn how Dell is supporting the 2014 Commonwealth Games in Glasgow, Scotland. Discover how the IT teams used Dell solutions in order to plan, execute, and overall make the endeavor that is the Commonwealth games happen. Tune in now to watch and find out more.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

How to Eliminate Known Vulnerabilities with Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This exclusive IT download will let you try out a patch management solution that adds non-Microsoft third-party patch to Microsoft System Center Configuration Manager to maximize your investment in System Center and to reduce risks from unpatched third-party applications.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
UTM White Papers | UTM Multimedia | UTM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement