IT Management  >   Systems Operations  >   Security  >   Security Management  >  

UTM

RSS Feed    Add to Google    Add to My Yahoo!
UTM Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

The Benefits of Cloud Mobility Management
sponsored by BlackBerry
WEBCAST: In this webcast, discover how cloud EMM works and what benefits it provides.
Posted: 24 Apr 2015 | Premiered: Apr 9, 2015

BlackBerry

RaboBank's Journey from Agile to DevOps: Deliver Better Apps Faster, Without Compromises
sponsored by Perfecto Mobile
WEBCAST: In this webcast, watch as Rabobank, one of Europe's largest banks, shares how they transformed their mobile development team and practices to fully embrace DevOps.
Posted: 16 Apr 2015 | Premiered: Apr 6, 2015

Perfecto Mobile

Managing SSL/TLS Vulnerabilities and Virtual Patching Best Practices
sponsored by Trend Micro
WEBCAST: Access this webinar to learn the options you have to better manage vulnerabilities and discover new methods to adapt and mitigate known and unknown threats.
Posted: 08 May 2015 | Premiered: May 12, 2015

Trend Micro

Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Unlocking the Power of Business Analytics in Oracle Cloud
sponsored by Oracle Corporation
WEBCAST: LOB managers want cloud solutions that are contrary to core IT values and are turning to shadow BI projects to satisfy their needs. Cloud BI provides balance between LOBs and IT. Watch this webcast to learn how Oracle Analytics Cloud can create a partnership between the two.
Posted: 13 May 2015 | Premiered: May 13, 2015

Oracle Corporation

Bypassing Security Policies using Insufficient Authorization
sponsored by White Hat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 14 Apr 2015 | Premiered: Apr 14, 2015

White Hat Security

Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
UTM White Papers | UTM Multimedia | UTM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement