IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  


RSS Feed   
Cryptography Multimedia (View All Report Types)
Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

Closing the Cloud Security Readiness Gap
sponsored by HyTrust
WEBCAST: Discover why security readiness lags behind adoption in the cloud and what can be done to mitigate the vulnerability and risk that creates.
Posted: 24 Jul 2017 | Premiered: Jul 24, 2017


Protecting Your Sensitive Data
sponsored by Symantec
VIDEO: Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.
Posted: 20 Feb 2018 | Premiered: 14 Feb 2018


Mission Impossible? Trusting Disparate Endpoints
sponsored by Citrix
VIDEO: Today's enterprise security landscape is heavily endpoint and user-dependent. You need to protect all sensitive enterprise data regardless of endpoint. In this webinar, you will learn how to secure your enterprise in an endless sea of endpoints.
Posted: 05 Feb 2018 | Premiered: 05 Feb 2018


Start Your Digital Transformation with SAP HANA and the Right Infrastructure
sponsored by IBM
VIDEO: This webcast dives in-depth into the benefits of running SAP HANA on IBM POWER Systems. Tune in as three experts talk through real-world cases of running HANA on POWER, and the results, including how the pair provides higher throughput to deliver fast business results, and more.
Posted: 20 Feb 2018 | Premiered: 13 Sep 2017


How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017


Continue to Transform or Risk Being Disrupted
sponsored by Rackspace AWS
WEBCAST: In this webinar, you'll see how Redbox evolved their IT methodologies in order to disrupt the movie rental industry. Tune in to learn how data center consolidation, limiting data sprawl, reducing licensing expense and more, factored into Redbox's dynamic digital transition.
Posted: 21 Aug 2017 | Premiered: Jun 1, 2017

Rackspace AWS

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement