Standards  >   Security Standards  >  

Wired Equivalent Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Wired Equivalent Privacy Multimedia (View All Report Types)
 
What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance
sponsored by Certified Security Solutions (CSS)
WEBCAST: Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.
Posted: 22 Sep 2016 | Premiered: Sep 16, 2015

Certified Security Solutions (CSS)

Protecting mobile devices - Best practices
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement