Software  >   Malware  >  

Worm Attacks

RSS Feed    Add to Google    Add to My Yahoo!
Worm Attacks Multimedia (View All Report Types)
 
Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Microsoft Forefront Security for Exchange Server Beta
sponsored by Microsoft
TRIAL SOFTWARE: Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
Posted: 26 Sep 2006 | Premiered: 26 Sep 2006

Microsoft

Deploy DevOps in Your Traditional Environment with Configuration Management Processes
sponsored by Red Hat
WEBCAST: Many companies are implementing new tactics and methodologies to help reduce their time to market and improve overall software quality. View this webcast now to learn how to implement DevOps for Java EE applications in a traditional, non-PaaS environment.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Case Study: How to Deal with a Self-Audit Request
sponsored by CDW Corporation
VIDEO: This video case study covers how one hospital group dealt with a self-audit request when they did not know if their software licensing was compliant.
Posted: 21 Jul 2014 | Premiered: 17 Apr 2014

CDW Corporation

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Integrated Security - McAfee Software and Intel vPro Technology Video
sponsored by Intel
WEBCAST: This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more.
Posted: 28 Dec 2012 | Premiered: Dec 28, 2012

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement