IT Management  >   Systems Operations  >  

Closed Loop Security

RSS Feed   
Closed Loop Security Multimedia (View All Report Types)
 
Cequence Security: API Sentinel Podcast
sponsored by Cequence
PODCAST: Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.
Posted: 25 Jun 2020 | Premiered: Jun 15, 2020

Cequence

Identify and Mitigate Threats to OpenShift Container-Based Infrastructure with Red Hat Training
sponsored by Red Hat
WEBCAST: How are you keeping your containers secure? In this Red Hat OpenShift webinar, learn about securing both containers and container orchestration platforms, from communication to access control to monitoring practices.
Posted: 27 Apr 2020 | Premiered: Apr 27, 2020

Red Hat

Phishing Factories and Economies - The Real Persistent Threat
sponsored by Akamai Technologies
VIDEO: Sadly, criminals will always leverage current events. Akamai's expert Security Research team has noted dozens of new Coronavirus domains are being deployed each day and we expect this trend to continue. In this presentation, take a deep dive into zero-day phishing detection and how it helps to fight back and reduce the impact of these scams.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Akamai Technologies

Extending Secure Access to Remote Workers
sponsored by Barracuda
WEBCAST: These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
Posted: 07 Apr 2020 | Premiered: Apr 7, 2020

Barracuda

How to Implement Zero Trust Security in Europe
sponsored by Okta
WEBCAST: Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero Trust model?Watch this webcast for answers to these questions and more from Forrester & Okta.
Posted: 01 Jul 2020 | Premiered: Sep 26, 2019

Okta

End-to-End Security Solutions for Mid-Market Businesses
sponsored by Dell Technologies and Intel
WEBCAST: Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

Dell Technologies and Intel

Discovery Inc. Case Study
sponsored by DivvyCloud
VIDEO: In this case study, find out how DivvyCloud allows Discovery to automate governance, offer flexibility, allow better insight and tighter controls and enhance compliance.
Posted: 08 Apr 2020 | Premiered: 08 Apr 2020

DivvyCloud

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The days of ransomware are not over, but the more ominous threats facing us now are cryptojacking, miners, and crypto exchange phishing. Is your environment safe? View this webcast to learn everything you need to know about cryptocurrency, cryptojacking, and how you can protect yourself.
Posted: 10 Mar 2020 | Premiered: Mar 10, 2020

Cisco Umbrella

Customer Identity and Access Management - Deciding Between Build vs Buy
sponsored by Akamai Technologies
WEBCAST: This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.
Posted: 22 Jun 2020 | Premiered: Jun 22, 2020

Akamai Technologies

7 Steps to SSO + MFA to On-Prem Apps
sponsored by Okta
WEBCAST: Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info