IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed   
Device Security Policies Multimedia (View All Report Types)
 
Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

5G Security: What Can We Learn from the IT World
sponsored by Barracuda
WEBCAST: 5G will become a critical enabler for the digital economy and digital society in the coming decade and marks a fundamental change in how networks are built, operated and managed. It presents massive opportunities, but it also introduces new security requirements. In this webinar, educate yourself on how to address these new 5G security challenges.
Posted: 21 Dec 2020 | Premiered: Dec 21, 2020

Barracuda

SIG - Virtual Cloud Security Summit: Securing Your Network from the Cloud
sponsored by Cisco Umbrella
VIDEO: With organizations continuing to embrace cloud migration, a shift in security is also necessary to maintain the protection of cloud-native workloads. In this video, discover how Cisco Umbrella unifies security capabilities for cloud users to ensure safe adoption and access. Watch now to get started.
Posted: 04 May 2020 | Premiered: 02 Apr 2020

Cisco Umbrella

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

Microsoft Cloud Accelerator Workshop
sponsored by Insight
VIDEO: In order to realize the full benefits of Microsoft 365, Microsoft offers a number of workshops designed to be a deep dive into a specific functionality or capability. Watch this short video for an overview of what’s covered in the cloud, remote work, compliance and security workshops.
Posted: 08 Jan 2021 | Premiered: 08 Jan 2021

Insight

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Certification Completion
sponsored by SailPoint Technologies
VIDEO: In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.
Posted: 24 Jul 2020 | Premiered: 24 Jul 2020

SailPoint Technologies

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences