Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Web Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
Web Blocking Software Multimedia (View All Report Types)
 
Reduce the Risks and Costs Associated with Software Assets and Licensing
sponsored by Snow Software
VIDEO: Organizations around the world spend over an estimated $330 billion on enterprise software every year. Software asset management (SAM) is designed to help you keep track of all your software licensing data, ensure compliance, and prevent overspending. Watch this 2 minute video to see how SAM will save your bottom line.
Posted: 23 Mar 2017 | Premiered: 26 Aug 2015

Snow Software

Build, Run, and Analyze Native Mobile Apps Easily
sponsored by PowWow
VIDEO: Web, Windows, Java – whatever kind of apps you have, your organization may be looking to implement a streamlined modernization and development strategy for extending these apps to mobile. Watch this brief video to explore how to leverage software containers, APIs, and machine learning in order to build, run, and analyze native mobile apps.
Posted: 21 Feb 2017 | Premiered: 15 Feb 2017


Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

Rethink Your Strategy with a Network Monitoring Switch
sponsored by Ixia
WEBCAST: Organizations worldwide are deploying best practices and turning to a network monitoring switch to provide the visibility, control, performance and security required for today's networks. Watch this webcast to learn about a practical, five-step approach for organizations to get the most from their network and security monitoring tools.
Posted: 20 Sep 2013 | Premiered: Sep 17, 2013, 14:00 EDT (18:00 GMT)

Ixia

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA

Software Defined Infrastructure for HPC
sponsored by IBM
WEBCAST: Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.
Posted: 28 Apr 2015 | Premiered: Mar 9, 2015

IBM

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement