IT Systems  >   Business Systems  >  

Security Systems

RSS Feed   
Security Systems Multimedia (View All Report Types)
1 - 25 of 62 Matches Previous Page  |  Next Page
Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

TOPICS: 
Arxan

How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by CoreLight
WEBCAST: In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019

TOPICS: 
CoreLight

The IT Security Confidant Vanishing Perimeter Pickup Sub
sponsored by Symantec
WEBCAST: See the benefits of Symantec Web Security Services today.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

TOPICS: 
Symantec

A New SIEM for a New World
sponsored by Empow Cyber Security
WEBCAST: With the rise of digital business, attack surfaces have expanded, data has become more abundant and complex and alerts have become a hindrance rather than a help. Traditional SIEMs aren't able to keep up with this new environment. Watch this webinar to learn about the kind of SIEM today's dynamic world requires.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

Cybersecurity Operations: Realities and Strategies
sponsored by Empow Cyber Security
WEBCAST: Traditional cybersecurity technologies were not built for today's dynamic environments. They were designed for a simpler time, but the world has changed and security strategies and technologies must change with it. Listen as Jon Oltsik, Senior Principal Analyst at ESG discusses how to keep your organization safe.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

How Natural Language Processing Can Automate Your SIEM
sponsored by Empow Cyber Security
WEBCAST: IT environments are growing more complex and bloated, but there aren't enough trained and knowledgeable security professionals available to manage and protect environments. In this webcast, Donnelly Financial's CISO Dannie Combs discusses how they tackled the cybersecurity skills shortage using next-gen SIEM.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

TOPICS: 
Empow Cyber Security

The Values of Both Building Your Own SOC and Buying SOC-as-a-Service
sponsored by Arctic Wolf
VIDEO: SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

TOPICS: 
Arctic Wolf

A New SIEM for a New World
sponsored by Empow Cyber Security
VIDEO: Don't get overwhelmed by the onrush of cybersecurity data – protect your organization by leveraging a modern SIEM that uses AI-powered analytics and automation to process that large volume of data and turn it to your advantage.
Posted: 31 Oct 2018 | Premiered: 25 Oct 2018

TOPICS: 
Empow Cyber Security

Solving the Financial Services Security Talent Shortage with Managed Detection
sponsored by Arctic Wolf
WEBCAST: This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

TOPICS: 
Arctic Wolf

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

TOPICS: 
Arctic Wolf

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

TOPICS: 
ThreatX

How a Security Expert Defends Your Network's Blind Spots
sponsored by Arctic Wolf
WEBCAST: Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical
sponsored by Arctic Wolf
WEBCAST: In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.
Posted: 29 Jun 2018 | Premiered: Jun 29, 2018

TOPICS: 
Arctic Wolf

What Happens When a Business Decides to Prevent Attacks Instead of React to Them?
sponsored by Cylance
VIDEO: Formel D is the global service provider for the automotive industry, where Global IT Manager Robert Osten oversees the teams responsible for building and maintaining the company's network in regards to threats. In this video, learn how Formel D used Cylance for their security needs, and how it compared to other systems they used in the past.
Posted: 12 Jun 2018 | Premiered: 23 May 2017

TOPICS: 
Cylance

Streamline Network Management, Monitoring, and Security: Demo
sponsored by Cato Networks
VIDEO: Watch this brief demo of a network security platform that's designed to help you simplify network monitoring and drive visibility into the apps, users, and devices on your network.
Posted: 06 Jun 2018 | Premiered: 30 Mar 2017

TOPICS: 
Cato Networks

Security Operations Center: Build on the Native Security Features of AWS and Office 365
sponsored by Arctic Wolf
WEBCAST: This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.
Posted: 18 May 2018 | Premiered: Dec 31, 2017

TOPICS: 
Arctic Wolf

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

TOPICS: 
WhiteHat Security

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

TOPICS: 
AdvizeX Technologies

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

TOPICS: 
HID Global

Get Real Time Threat Detection Starting on Day 1 with AlienVault USM
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

TOPICS: 
AlienVault

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

TOPICS: 
RSA

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

TOPICS: 
Hewlett Packard Enterprise

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

TOPICS: 
ISACA

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

TOPICS: 
Threat Track Security
1 - 25 of 62 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement