IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

Coalition for Networked Information

RSS Feed   
ALSO CALLED: CNI
DEFINITION: A consortium formed by American Research Libraries, CAUSE, and EDUCOM (these are not acronyms) to promote the creation of, and access to, information resources in networked environments in order to enrich scholarship and enhance intellectual productivity.
Coalition for Networked Information Multimedia (View All Report Types)
25 Matches
PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security
sponsored by GFI Software
PODCAST: With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs...
Posted: 01 Apr 2008 | Premiered: Jan 1, 2008

TOPICS:  Fax Services
GFI Software

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

InSecurity Podcast: Clint Watts on Social Media Manipulation
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by special guest Clint Watts, author and MSNBC national security contributor, as they discuss cyberattacks and hackers in the social media world.
Posted: 27 Aug 2018 | Premiered: Jun 18, 2018

Cylance

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

nTier with Deduplication
sponsored by Spectra Logic Corporation
WEBCAST: The webcast demonstrates Spectra's nTier with deduplication, a turnkey preconfigured storage solution supporting up to 674 TB of logical storage. With this appliance, an organization can dramatically reduce their storage consumption.
Posted: 24 Mar 2009 | Premiered: Mar 24, 2009

Spectra Logic Corporation

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

Dell Active Fabric Manager (AFM) 2.0 CLI for VMware vSphere Distributed Switch (VDS)
sponsored by DellEMC and Intel®
WEBCAST: This informative webcast discusses a networking solution that lets administrators easily design, configure, and deploy data center fabrics while helping to simplify operations and optimize network performance.
Posted: 12 Nov 2013 | Premiered: Nov 12, 2013

DellEMC and Intel®

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

How You Can Make Incident Response Faster and More Efficient
sponsored by Corelight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

Corelight

HPE Social Enterprise Services
sponsored by Hewlett-Packard Enterprise
WEBCAST: Social networks have revolutionized the way that today's customers gain information and make buying decisions. This brief video introduces a social enterprise service that enables your organization to effectively harness and exploit social information.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Enterprise

Next-Level Citrix Networking Solutions for your Virtual Desktop
sponsored by Citrix
WEBCAST: This informative resource explores one company's top-tier virtual desktop tool and how the right networking tool can enhance your productivity.
Posted: 23 Jun 2014 | Premiered: Jul 25, 2011

Citrix

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

Free Software – Solve Common LAN problems with Switch Port Monitor Utility
sponsored by Fluke Networks
SOFTWARE DOWNLOAD: For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more.
Posted: 12 Oct 2010 | Premiered: 12 Oct 2010

Fluke Networks

5 Ways Bro Gives You Better Data for Incident Response and Threat Hunting
sponsored by Corelight
WEBCAST: Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity data streams for traffic analysis.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

Corelight

WhatsUp Gold v11 Premium
sponsored by Ipswitch WhatsUp Gold
TRIAL SOFTWARE: Any network interruption can bring productivity to a halt and significantly impact business revenue, WhatsUp Gold offers network management for businesses of all sizes to optimize critical business technology.
Posted: 20 Jul 2007 | Premiered: 20 Jul 2007

Ipswitch WhatsUp Gold

Unified Networking with 10 Gigabit Converged Network Adapters
sponsored by Insight & Intel
WEBCAST: This informative resource explores one company's Ethernet adapter and how you can consolidate your LAN/SAN traffic on one network, lowering costs and simplifying management.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Insight & Intel

Zenoss Core: Open Source Enterprise Monitoring Platform
sponsored by Zenoss, Inc.
PRODUCT DEMO: Zenoss Core provides a single tool to give you comprehensive insight into your entire IT infrastructure including applications, servers, and network. All information and administration is presented via a web application.
Posted: 18 Dec 2007 | Premiered: 18 Dec 2007

Zenoss, Inc.

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

Corelight

NetScaler: Visibility
sponsored by Citrix
WEBCAST: This informative resource explores one company's top-tier visibility platform and outlines how it can enhance your virtual desktop environment.
Posted: 23 Jun 2014 | Premiered: Jan 28, 2014

Citrix

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Get Real Time Threat Detection Starting on Day 1 with AlienVault USM
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AT&T Cybersecurity
25 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement