IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Packet Monkey

RSS Feed   
Packet Monkey Multimedia (View All Report Types)
 
Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Business Email Compromise Attack Evolution and Prevention
sponsored by Blackberry Cylance
WEBCAST: In this webinar, Cylance Consulting Director Sig Murphy presents a comprehensive overview of the origins of business email compromise and evolving attack trends, providing you the information needed to proactively defend systems and endpoints from future attacks.
Posted: 02 Jul 2019 | Premiered: Jul 2, 2019

Blackberry Cylance

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

The Software-Defined Transformation: What's in your Branch Network?
sponsored by Versa Networks
WEBCAST: In this webcast, hear from Capital One's Technology Director, Jason Abfalter, find out how the bank transformed their WAN across branches in order to support the more digital and mobile-first way customers prefer to bank today.
Posted: 24 Sep 2018 | Premiered: Dec 31, 2017

Versa Networks

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

3 Steps to a Cloud-Ready WAN in 2018
sponsored by Apcela
WEBCAST: State of the wan 2018 and wan security, 3 simple steps to a cloud ready wan: map your apps to the cloud, leverage distributed communications hubs, deploy app aware routing and auto, key considerations for wan and branch office evo, plus sec, edge compute, and auto
Posted: 05 Oct 2018 | Premiered: Apr 25, 2018

Apcela

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by Corelight
WEBCAST: Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019

Corelight

Cyber Global Warming Real Life Malscape Insights
sponsored by Dell SecureWorks
WEBCAST: In this webcast, learn how you can measure your cyber-resilience with behavioral intelligence.
Posted: 07 Feb 2019 | Premiered: Oct 2, 2018

Dell SecureWorks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement