IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed   
AUP Multimedia (View All Report Types)
 
Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

ITSM and Digital Transformation – Where Are We?
sponsored by Serviceaide
WEBCAST: Hear from ITSM and IT automation experts as they discuss the impending evolution of ITSM under the pressures of digital transformation – and how technology like AI, machine learning, and process automation will become crucial to a successful IT service strategy.
Posted: 17 Jun 2019 | Premiered: Nov 27, 2018

Serviceaide

Is Your DNS At Risk?
sponsored by Neustar
VIDEO: DNS downtime, no matter how short, is never good. So, what preventative security measures can you take? In this short video, learn how your organization can prevent DNS downtime and ensure excellent latency and quick, reliable global coverage today.
Posted: 01 Mar 2019 | Premiered: 01 Mar 2019

Neustar

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

The Future of Digital Onboarding
sponsored by Onfido
VIDEO: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.
Posted: 03 Apr 2019 | Premiered: 03 Apr 2019

Onfido

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Acalvio Deception Intro Video
sponsored by Acalvio
WEBCAST: In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.
Posted: 27 Jun 2019 | Premiered: Jun 27, 2019

Acalvio

Propel PLM: Cloud Security in 5 Minutes
sponsored by PropelPLM
VIDEO: Is my data safe in the cloud? For those considering cloud-based PLM, questions of security always come to mind. In this 5-minute video, Propel Marketing VP addresses common cloud myths, and answers common cloud security questions. Download now to access the full video, and put your mind at ease.
Posted: 15 Feb 2019 | Premiered: 12 Jun 2018

PropelPLM
 
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement