IT Agents  >   Industry Organizations  >   Information Industry Organizations  >  

Coalition for Networked Information

RSS Feed   
ALSO CALLED: CNI
DEFINITION: A consortium formed by American Research Libraries, CAUSE, and EDUCOM (these are not acronyms) to promote the creation of, and access to, information resources in networked environments in order to enrich scholarship and enhance intellectual productivity.
Coalition for Networked Information Multimedia (View All Report Types)
25 Matches
PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security
sponsored by GFI Software
PODCAST: With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs...
Posted: 01 Apr 2008 | Premiered: Jan 1, 2008

TOPICS: 
GFI Software

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

TOPICS: 
LogRhythm, Inc.

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

TOPICS: 
Core Security Technologies

InSecurity Podcast: Clint Watts on Social Media Manipulation
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by special guest Clint Watts, author and MSNBC national security contributor, as they discuss cyberattacks and hackers in the social media world.
Posted: 27 Aug 2018 | Premiered: Jun 18, 2018

TOPICS: 
Cylance

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

TOPICS: 
Symantec Corporation

nTier with Deduplication
sponsored by Spectra Logic Corporation
WEBCAST: The webcast demonstrates Spectra's nTier with deduplication, a turnkey preconfigured storage solution supporting up to 674 TB of logical storage. With this appliance, an organization can dramatically reduce their storage consumption.
Posted: 24 Mar 2009 | Premiered: Mar 24, 2009

TOPICS: 
Spectra Logic Corporation

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

TOPICS: 
Juniper Networks, Inc.

Overcoming the Challenges of Architecting for the Cloud
sponsored by Zscaler
WEBCAST: 98% of IT decision-makers say next-gen networks are required. Companies are moving away from appliance-based VPNs and towards cloud for remote network access. Tune into this webcast for more information on how to secure your cloud network.
Posted: 04 Oct 2018 | Premiered: Oct 4, 2018

TOPICS: 
Zscaler

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

TOPICS: 
AlienVault

Dell Active Fabric Manager (AFM) 2.0 CLI for VMware vSphere Distributed Switch (VDS)
sponsored by DellEMC and Intel®
WEBCAST: This informative webcast discusses a networking solution that lets administrators easily design, configure, and deploy data center fabrics while helping to simplify operations and optimize network performance.
Posted: 12 Nov 2013 | Premiered: Nov 12, 2013

TOPICS: 
DellEMC and Intel®

How You Can Make Incident Response Faster and More Efficient
sponsored by CoreLight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

TOPICS: 
CoreLight

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

TOPICS: 
Symantec Corporation

HPE Social Enterprise Services
sponsored by Hewlett-Packard Enterprise
WEBCAST: Social networks have revolutionized the way that today's customers gain information and make buying decisions. This brief video introduces a social enterprise service that enables your organization to effectively harness and exploit social information.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

TOPICS: 
Hewlett-Packard Enterprise

Next-Level Citrix Networking Solutions for your Virtual Desktop
sponsored by Citrix
WEBCAST: This informative resource explores one company's top-tier virtual desktop tool and how the right networking tool can enhance your productivity.
Posted: 23 Jun 2014 | Premiered: Jul 25, 2011

TOPICS: 
Citrix

5 Ways Bro Gives You Better Data for Incident Response and Threat Hunting
sponsored by CoreLight
WEBCAST: Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity data streams for traffic analysis.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

TOPICS: 
CoreLight

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

TOPICS: 
AlienVault

Free Software – Solve Common LAN problems with Switch Port Monitor Utility
sponsored by Fluke Networks
SOFTWARE DOWNLOAD: For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more.
Posted: 12 Oct 2010 | Premiered: 12 Oct 2010

TOPICS: 
Fluke Networks

WhatsUp Gold v11 Premium
sponsored by Ipswitch WhatsUp Gold
TRIAL SOFTWARE: Any network interruption can bring productivity to a halt and significantly impact business revenue, WhatsUp Gold offers network management for businesses of all sizes to optimize critical business technology.
Posted: 20 Jul 2007 | Premiered: 20 Jul 2007

TOPICS: 
Ipswitch WhatsUp Gold

Unified Networking with 10 Gigabit Converged Network Adapters
sponsored by Insight & Intel
WEBCAST: This informative resource explores one company's Ethernet adapter and how you can consolidate your LAN/SAN traffic on one network, lowering costs and simplifying management.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

TOPICS: 
Insight & Intel

You Can't Move Legacy to the Cloud
sponsored by Zscaler
VIDEO: Watch this 15-minute webinar to learn the common challenges of using virtualized appliances for distributed network security, and find out how you can best achieve the security, visibility, and control you need in your branch offices.
Posted: 15 Jan 2019 | Premiered: 11 Jan 2019

TOPICS: 
Zscaler

WAN Management & Configuration Made Easy
sponsored by Talari Networks
VIDEO: Watch this brief 3-minute video to see how a WAN management platform can help you provision, assess and adjust your network on the fly—to get the SLAs you're paying for and deliver the SLAs your applications need.
Posted: 08 Jun 2018 | Premiered: 08 Jun 2018

TOPICS: 
Talari Networks

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

Streamline Network Management, Monitoring, and Security: Demo
sponsored by Cato Networks
VIDEO: Watch this brief demo of a network security platform that's designed to help you simplify network monitoring and drive visibility into the apps, users, and devices on your network.
Posted: 06 Jun 2018 | Premiered: 30 Mar 2017

TOPICS: 
Cato Networks

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

TOPICS: 
DomainTools
25 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement