IT Management  >   Systems Operations  >   Security  >   Security Management  >  

ITM

RSS Feed   
ITM Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos

How Threat Modeling & Attack Simulation Works
sponsored by Coalfire
WEBCAST: In this webinar, join Mike Weber, VP of Innovation at Coalfire, as he overviews how threat modeling and cyberattack simulations work within security program architectures – including how to interpret simulation data. Watch now to learn more about identifying and understanding the risks within your environment.
Posted: 06 Jul 2020 | Premiered: Jul 6, 2020

Coalfire

Best Practices for Successful Transformation Journey with Automation
sponsored by Red Hat
VIDEO: In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat

SailPoint Identity Hub: Search, Track & Manage Access
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Example of a Cloud Ransomware Attack Video Presented by Spin Technology
sponsored by Spin Tech
VIDEO: As organizations continue to move their sensitive data to cloud environments, it should come as no surprise that hackers are altering their methods to improve the success rates of their ransomware campaigns. Watch this video to see how a seemingly simple phishing scheme leads to a cloud ransomware attack.
Posted: 22 Jun 2020 | Premiered: 01 Apr 2020

Spin Tech

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

How to Implement Zero Trust Security in Europe
sponsored by Okta
WEBCAST: Zero Trust has come a long way since its inception in 2009, but many still have questions. What should Zero Trust look like? How does it affect workloads, networks, people and devices within an organization? How can I begin to implement my own Zero-Trust model? Watch this webcast for answers to these questions and more from Forrester & Okta.
Posted: 01 Jul 2020 | Premiered: Sep 26, 2019

Okta

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Artificial Intelligence in Cybersecurity
sponsored by Spin Tech
VIDEO: Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.
Posted: 23 Jun 2020 | Premiered: 11 Jun 2020

Spin Tech
 
Browse by Report Type:
ITM White Papers | ITM Multimedia | ITM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info