IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hat Hackers

RSS Feed    Add to Google    Add to My Yahoo!
White Hat Hackers Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Making the Cloud a Big Opportunity for Datatility
sponsored by IBM
WEBCAST: Datatility needed a cloud solution to fit its demanding storage requirements. See how IBM met the challenge.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Video Part 1: Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS provides security questions to ask when vetting a cloud service or SaaS provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Capabilities for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Compare critical capabilities across Security Information and Event Management vendors to choose the best SIEM solution.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Scalable and Sustainable Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to evolve your endpoint security to outsmart attackers, respond faster and drive efficiency.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

The Rise of Cyber Threat Intelligence Sharing
sponsored by Intel Security
WEBCAST: Over 50% of security pros feel cyber threat intelligence sharing is valuable. See how your organization can benefit.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Putting Managed File Transfer in Perspective
sponsored by IBM
WEBCAST: Think about these two themes as you adapt your managed file transfer initiatives to grow with current technology trends.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Magic Quadrant for Endpoint Protection Platforms
sponsored by Intel Security
WEBCAST: Review the strengths and cautions for the vendors in Gartner's Endpoint Protection Platforms Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement