IT Management  >   Systems Operations  >   Security  >  

Threat Mitigation

RSS Feed   
Threat Mitigation Multimedia (View All Report Types)
 
IT Priorities 2018 - What's happening in security?
sponsored by ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018

ComputerWeekly.com

Channel Security Experts Deep Dive: The Anatomy of an MSP Breach
sponsored by Datto, Inc.
WEBCAST: In the following webinar, Channel security experts dig further into the anatomy of MSP breaches. Tune in to join the discussion on the state of cybersecurity in the IT channel, low to zero cost tactics that improve MSP cyber defenses, and more.
Posted: 16 Oct 2019 | Premiered: Oct 16, 2019

Datto, Inc.

Okta + Shape: Stopping Identity Attacks in their Tracks
sponsored by Shape Security
VIDEO: In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Introduction to Claroty
sponsored by Claroty
WEBCAST: In this webcast, Claroty's Dave Weinstein discusses how Claroty's solution helps IoT-OT security and operations teams discover IoT-OT assets on the network and identify vulnerabilities, continuously monitor networks and detect malicious activity and more.
Posted: 27 Sep 2019 | Premiered: Sep 27, 2019

Claroty

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

Ten Strategies of a World-Class Security Operations Center
sponsored by Corelight
WEBCAST: The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018

Corelight

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Acalvio ShadowPlex Presentation
sponsored by Acalvio
WEBCAST: Acalvio ShadowPlex provides advanced threat detection capabilities using enterprise deception at the core of its solution. Watch this live demo of Acalvio ShadowPlex to learn more about the platform and how to use it.
Posted: 24 Jun 2019 | Premiered: Apr 29, 2019

Acalvio

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement