IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat Management Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Shifting IT from Cost Center to Innovation Center
sponsored by vmware airwatch
WEBCAST: Watch this webcast to explore how VMware IT is empowering users with IT-build internal apps and tools that have enhanced scalability. Discover how to make it simple for internal teams to rework existing technologies, create access to critical information across all your devices, and more.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

A First Look at the Future of Windows Management and Security
sponsored by vmware airwatch
WEBCAST: Watch this 3 minute webinar to learn how unified endpoint management technologies come together to lower the cost of managing your Windows deployments, secure endpoints and data on any network across any application, and deliver peak user experience across any device.
Posted: 16 Dec 2016 | Premiered: Dec 16, 2016

vmware airwatch

Webcast: Ansible FAQ for Automated Application Deployment
sponsored by Red Hat
VIDEO: Tune into this tutorial to leverage agentless automation to streamline IT configuration processes, migrate applications for better optimization, and provide a single language for DevOps practices across your organization—even for the most complex multi-tier app environments.
Posted: 12 Jan 2017 | Premiered: 12 Jan 2017

Red Hat

SaaS Vendor: Performance Most Critical Storage Requirement
sponsored by NetApp SolidFire
VIDEO: The ability to support its growing product line and customer base were top considerations when choosing a solution.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

Transforming Education with Technology
sponsored by NetApp
WEBCAST: See how one of the largest US public education systems uses technology to help students realize their full potential.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016

TOPICS:  IT Management
NetApp

Magic Quadrant for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Find out the strengths and cautions for the vendors in Gartner's SIEM Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Scalable and Sustainable Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to evolve your endpoint security to outsmart attackers, respond faster and drive efficiency.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement