IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

AUP

RSS Feed   
AUP Multimedia (View All Report Types)
 
Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
WEBCAST: In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights.
Posted: 19 Feb 2018 | Premiered: Feb 14, 2018

One Identity

Avoid the Legacy SIEM Death Trap and Keep Your Organization Alive
sponsored by Splunk
VIDEO: This webcast outlines steps to take when embarking on a new SIEM journey. Then hear from 3 companies who successfully migrated to a new SIEM and reaped the rewards.
Posted: 15 Feb 2018 | Premiered: 05 Dec 2017

Splunk

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

3 Life Hacks for Rationalizing your Application & Technology Portfolios
sponsored by Mega International
VIDEO: When streamlining your IT portfolio your goal is to free up budget for new initiatives, and you need an efficient method of doing so. This webcast covers three life hacks to help you work smarter, not harder, when engaging in an IT portfolio rationalization project.
Posted: 10 Jan 2018 | Premiered: 10 Jan 2018

Mega International

Painless DevSecOps Integration across the Value Stream
sponsored by Tasktop
WEBCAST: This webcast explores how to take a DevSecOps approach to minimizing the impact of vulnerabilities on your apps. Find out how to make developers, QAers, and security pros aware of vulnerabilities as soon as possible and discover how you can integrate tools end-to-end across the value stream.
Posted: 06 Feb 2018 | Premiered: Feb 6, 2018

Tasktop

Protecting Data After the Digital Disruption
sponsored by Proofpoint, Inc.
WEBCAST: Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

McAfee Cloud Visibility-Community Editioin
sponsored by McAfee, Inc.
VIDEO: Cloud services provide many benefits, but Shadow IT can expose sensitive data. Find out if your company is at risk.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Automating Your Corporate Mobility Management
sponsored by Cisco Jasper
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Jasper
 
Browse by Report Type:
AUP White Papers | AUP Multimedia | AUP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement