IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat Management Multimedia (View All Report Types)
 
Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Bolstering Your Mobile Mojo: The State of Enterprise Mobility
sponsored by IBM
WEBCAST: Are you struggling to keep up with your mobile users? This webcast will help you get connected with one enterprise cloud solution for your organization's mobile device management (MDM). Click here to see the benefits of your business working in the cloud.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

6 Steps for Preventing Insider Threats
sponsored by Varonis
WEBCAST: This webcast outlines six ways you can stay safe from the ever-present threat of insider attacks.
Posted: 26 Jun 2015 | Premiered: Jun 26, 2015

Varonis

Fanatical Support in a Microsoft World
sponsored by Rackspace
WEBCAST: Managing Microsoft Cloud can be complex, but Fanatical Support makes sure everything runs as smoothly as possible users. From getting started to daily support and troubleshooting, Fanatical Support makes Microsoft Cloud simple. Watch this video to learn more about Fanatical Support and how it can support your business needs.
Posted: 18 May 2015 | Premiered: Jan 30, 2015

Rackspace

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

You've Been Breached: Now What Do You Do?
sponsored by Dell SecureWorks
PODCAST: This podcast features tips on how to remedy a security breach before it can do lasting harm on your organization.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

Dell SecureWorks

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015

StarMobile

Monitoring Citrix Mobile Workspace with System Center
sponsored by ComTrade
VIDEO: This webcast discusses a management and monitoring platform for Citrix Workspace Suite. Find out how its capabilities cover the Workspace suite components around workforce mobility and see a demo of each component.
Posted: 12 Aug 2015 | Premiered: 22 May 2015

ComTrade
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement