IT Management  >   Systems Operations  >   Network Management  >  

Policy-Based Management (Network Management)

RSS Feed   
Policy-Based Management (Network Management) Multimedia (View All Report Types)
 
Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

How to Provide Remote Support at Scale with TeamViewer Tensor
sponsored by TeamViewer
WEBCAST: In this webinar, learn how you can better support remote data centers and devices with a cloud-based remote connectivity platform that helps fast, reliable remote support to hundreds or even thousands of computers, servers or other devices—all without compromising performance, security, manageability, or reliability.
Posted: 15 May 2019 | Premiered: May 15, 2019

TeamViewer

What's in Your Branch?
sponsored by Versa Networks
VIDEO: Digital transformation and hybrid multi-cloud need a truly software-defined architecture for the edge and the WAN. In this short video, learn about how Capital One's digital transformation journey has been driven by software-defining the branch with the Versa Cloud IP Platform.
Posted: 19 Aug 2019 | Premiered: 12 Oct 2017

Versa Networks

HOL: Container Native Application Development
sponsored by Oracle Corporation
WEBCAST: Between enhancement requests, bug fixes, and a need for faster cloud delivery, DevOps teams need a way to manage these issues. Watch this container development lab to understand the specifics behind container usage to help ease the burden on DevOps teams.
Posted: 02 Jul 2019 | Premiered: Mar 18, 2018

TOPICS:  CIOs | IT Management
Oracle Corporation

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

Corelight

Experience Dynamic Endpoint Threat Defense
sponsored by McAfee, Inc.
VIDEO: Simplify your system and stay ahead of advanced threats with a collaborative framework that shares threat intelligence.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Be the Champion of Security in a DevOps World
sponsored by Veracode, Inc.
VIDEO: Watch this Infosecurity Magazine webinar to learn how to become a champion of security with DevOps.
Posted: 17 Jan 2018 | Premiered: 17 Jan 2018

TOPICS:  IT Management
Veracode, Inc.

National Weather Service Provider Delivers Quality 24x365
sponsored by IBM
VIDEO: Hear how Met Office in the UK leverages a flexible infrastructure to efficiently analyze data in real-time.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
VIDEO: Watch this video to learn how DevOps can impact security and how to make the development process secure as well.
Posted: 17 Jan 2018 | Premiered: 17 Jan 2018

TOPICS:  IT Management
Veracode, Inc.

Tech Talk: Busting the Malware Silver Bullet Myth
sponsored by McAfee, Inc.
VIDEO: Hear how multiple layers of advanced malware detection and analysis technologies combat cyberthreat innovation.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement