Software  >   Systems Software  >  

Internetwork Operating Systems

RSS Feed   
Internetwork Operating Systems Multimedia (View All Report Types)
 
Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Get More Virtual with Dell and VMware vSphere
sponsored by DellEMC and IntelĀ®
WEBCAST: Learn how Dell has designed and integrated the Dell EqualLogic Virtual SAN with VMware® vSphere 4.0 with to help you save money and get more virtual.
Posted: 24 Jun 2009 | Premiered: Jun 9, 2009

DellEMC and IntelĀ®

IBM Tivoli Security User Compliance Management Demo
sponsored by IBM
SOFTWARE DEMO: This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Red Hat Enterprise Virtualization Competitive Features, Performance and Price
sponsored by Red Hat and HP
WEBCAST: Access this webcast to learn about the new features of Red Hat Enterprise Virtualization 3.0. This webcast provides a hypervisor comparison and outlines the benefits of choosing an open-source, enterprise-ready option.
Posted: 19 Jul 2012 | Premiered: Feb 16, 2012

Red Hat and HP

HP-UX 11i on Integrity servers: HP value for Solaris users
sponsored by Hewlett-Packard Enterprise
WEBCAST: Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users.
Posted: 19 May 2010 | Premiered: Jan 1, 2010

Hewlett-Packard Enterprise

JIRA 3.11
sponsored by Atlassian
TRIAL SOFTWARE: This IT download provides a project management tool known as Atlassian JIRA which is designed to improve the functionality and flexibility of legacy systems.
Posted: 27 Sep 2007 | Premiered: 26 Sep 2007

Atlassian

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

CA ARCserve Backup r12.5 Disaster Recovery
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 disaster recovery tools. This video offers detailed instructions on this solution's functionality.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Citrix AppDNA Product-overview
sponsored by Citrix
PRODUCT DEMO: This webcast details a software solution that enables faster migrations and streamlines your desktop application management. Discover how this solution simplifies the evaluation of application performance, and resolves compatibility issues through automation, remediation and modeling analysis. View a short demo and learn about the key benefits.
Posted: 02 Oct 2012 | Premiered: 02 Oct 2012

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement