IT Management  >   Systems Operations  >   Security  >  

Security Administration

RSS Feed   
Security Administration Multimedia (View All Report Types)
 
Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

Arctic Wolf

Webinar Recording: Linux Kernel Live Patching in VMware Cloud on AWS
sponsored by CloudLinux
VIDEO: While many organizations opt for hybrid cloud due to its adaptability, the disparate tools and controls required for it to function optimally can create security vulnerabilities and data leakage. In this webinar, go in-depth into combining hybrid cloud services, like VMware and AWS, to ensure security compliance efforts.
Posted: 27 Jan 2020 | Premiered: 16 Sep 2019


Protecting from Bot Attacks with PerimeterX
sponsored by PerimeterX
VIDEO: In this customer success story, Build.com shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks. Watch the video to learn more.
Posted: 10 Dec 2019 | Premiered: 03 Jan 2020

PerimeterX

Security Governance: Building a Framework and Establishing Trust
sponsored by RSA Conference
WEBCAST: Not only is Kuwait’s oil and gas industry critical to its economy—it’s also heavily targeted by global threat actors. In this RSAC Unplugged presentation, see how Kuwait’s oil and gas companies reached a consensus around common security objectives and a unified governance framework to protect this vital sector.
Posted: 22 Jan 2020 | Premiered: Oct 10, 2019

RSA Conference

Holistic Privacy Readiness
sponsored by Okera
WEBCAST: In this Okera webcast, learn about the requirements for holistic privacy readiness and the best practices for S3 and azure data lakes.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

Okera

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info