IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat Management Multimedia (View All Report Types)
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


What is Threat Intelligence?
sponsored by BrightPoint Security
VIDEO: In this brief video, security expert Rich Reybok discusses how threat intelligence can be practically leveraged to enhance an organization's security.
Posted: 08 Sep 2015 | Premiered: 27 Aug 2015

BrightPoint Security

Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


Does the Cloud Fit into Hybrid Data Environments?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Shawn Rogers, Chief Research Officer in the Information Management Group at Dell, examines an advanced data analytics solution that enterprises can leverage in the cloud for enhanced data learning. View now to see how you can merge your enterprise cloud with others.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Dell, Inc.

Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


Threats Will Get In: What Will You Do About Them?
sponsored by Splunk
VIDEO: This brief video explains the necessity of adjusting your security strategy to focus more on detecting and mitigating threats.
Posted: 21 Aug 2015 | Premiered: 02 Jul 2014


Why Partnering with the Right People is a Necessity for Channel Programs
sponsored by Schneider Electric
WEBCAST: In the following webcast, learn about the importance of partnering with an effective IT services provider and uncover where you can turn for help in deciding which partner is right for your business. Access now and ensure that your business runs smoothly, even in the wake of new IT pressures like the third platform.
Posted: 30 Sep 2015 | Premiered: Sep 22, 2015

Schneider Electric

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement