IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security IT Downloads (View All Report Types)
 
An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

Self-Management of Passwords (SMOP) Version 1.1
sponsored by turbo-IT Corporation
SOFTWARE DEMO: Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs.
Posted: 17 May 2011 | Premiered: 17 May 2011

turbo-IT Corporation

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity

PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

MapXtreme Java v4.8.1
sponsored by MapInfo Corporation
TRIAL SOFTWARE: This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.
Posted: 10 Mar 2008 | Premiered: 10 Mar 2008

MapInfo Corporation

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

IBM Lotus Complete Collaboration Express Starter Pack
sponsored by IBM
SOFTWARE DEMO: Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement