Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virtual Private Network Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virtual Private Network Appliances Multimedia (View All Report Types)
 
The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

The CIO Perspective on Intel vPro Technology
sponsored by Intel
VIDEO: Gerry Weaver, CIO of the State of Indiana, and Diane Bryant, CIO of Intel, talk about how Intel vPro technology helps address end-user and IT efficiencies in their environments. The CIOs discuss real ROI numbers from Intel vPro technology, including savings of $1 million or more.
Posted: 29 Apr 2010 | Premiered: 11 Jan 2010

Intel

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Workstation Advisor Tool
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
Posted: 10 Apr 2014 | Premiered: 10 Apr 2014

Dell, Inc.

Integrated Security - McAfee Software and Intel vPro Technology Video
sponsored by Intel
WEBCAST: This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more.
Posted: 28 Dec 2012 | Premiered: Dec 28, 2012

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement