IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed   
Unified Threat Management Multimedia (View All Report Types)
 
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Eliminating Cybersecurity Obscurity Through Continuous Security Validation
sponsored by NSS Labs
PODCAST: How is your organization defending against security risks? Explore this podcast to learn about how organizations can obtain real time metrics about the effects of risk and security controls to their systems.
Posted: 30 Mar 2018 | Premiered: Mar 27, 2018

NSS Labs

Start Your Digital Transformation with SAP HANA and the Right Infrastructure
sponsored by IBM
VIDEO: This webcast dives in-depth into the benefits of running SAP HANA on IBM POWER Systems. Tune in as three experts talk through real-world cases of running HANA on POWER, and the results, including how the pair provides higher throughput to deliver fast business results, and more.
Posted: 20 Feb 2018 | Premiered: 13 Sep 2017

IBM

Webinar: How to Migrate Sensitive Records to AWS
sponsored by AWS - Logicworks
WEBCAST: Migrating sensitive data to the cloud is becoming unavoidable. You'll want to make sure it's done securely, especially with GDPR's stiff financial penalties looming. Register for this webinar taking place on May 1, 2018 to learn how to migrate sensitive data to Amazon Web Services (AWS).
Posted: 30 Mar 2018 | Premiered: Mar 30, 2018

AWS - Logicworks

Aqua 2.0 Secrets Management for Containers
sponsored by Aqua Security
WEBCAST: Digitization and containerized environments have made secret management much more complicated than it ever was before. Watch this clip on a secret management solution that will seamlessly integrate into your containers from the Hashicorp vault.
Posted: 08 Mar 2018 | Premiered: Jul 27, 2017

Aqua Security

Webinar: What Machine Learning Can (and Can't) do to Help Solve Today's Mobile Security Problems
sponsored by Lookout
WEBCAST: Watch this webinar to discover what machine learning can and can't do to help solve today's top mobile security concerns.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Automating Your Corporate Mobility Management
sponsored by Cisco Jasper
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Jasper

A Complete Paradigm Shift in Enterprise Storage
sponsored by IBM
WEBCAST: It's time to get more value from your data storage solution. Answer these questions for a comparative cost of ownership.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

In Place Analytics for VSAM, ADABAS, DB2, IMS and more
sponsored by IBM
WEBCAST: Hear about the latest QMF enhancements and experience a demonstration of the self-service Business Analytics feature.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WEBCAST: This webcast outlines the steps most of Veracode's customers take to develop a mature application security program and provides more information on mature AppSec programs.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement