IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat ManagementMultimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them
sponsored by Lumension
WEBCAST: This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Secure DNS Prevents DDoS Attacks
sponsored by Neustar┬«
WEBCAST: This informative webcast discusses why DNS has become a favorite target for DDoS attacks and how a hardened DNS combined with cloud-based protection can provide the shield your organization needs.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Why Enterprises Are Really Deploying NGFWs
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Fortinet, Inc.

Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

Rethinking Enterprise Mobility: The Way It Should Be
sponsored by CA Technologies.
WEBCAST: In this expert webcast, mobility expert Jack Madden takes and in-depth look at mobile management, discussing the critical role management plays in all aspects of the mobile environment and examining some of the most effective strategies and solutions are available to you.
Posted: 27 Mar 2014 | Premiered: Mar 24, 2014

CA Technologies.

Understand and Counter Insider Threats with Behavioral Analytics
sponsored by Hewlett-Packard Company
WEBCAST: This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.
Posted: 25 Feb 2014 | Premiered: Nov 14, 2013

Hewlett-Packard Company

MDM is Not Enough - Secure Mobile File Sharing with Acronis Access
sponsored by Acronis
WEBCAST: This informative webcast examines a file syncing and sharing solution that allows mobile workers to share and access the applications and data they need to be productive and efficient while maintaining the highest levels of enterprise security.
Posted: 20 Mar 2014 | Premiered: Mar 18, 2014

Acronis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement