Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Security Hardware

RSS Feed   
e-Mail Security Hardware Multimedia (View All Report Types)
 
Deploying SD-WAN Environment with Barracuda
sponsored by Barracuda
VIDEO: In this short video, walk through the steps to deploying an SD-WAN with Barracuda’s cloud generation firewalls.
Posted: 28 Apr 2020 | Premiered: 28 Apr 2020

Barracuda

Highlighting the Role of Response in Network Detection & Response
sponsored by Fidelis
PODCAST: Network Detection and Response (NDR) is the latest trend in network-based cybersecurity. NDR provides holistic visibility of the cyber terrain, produces high confidence detections and automates response in a cyber relevant time. In this podcast, listen as Fidelis’ COO, Craig Harber, discusses the role of response in NDR.
Posted: 18 Aug 2020 | Premiered: Aug 18, 2020

Fidelis

SD-WAN Collaboration Demonstration Annotated
sponsored by Oracle Communications
VIDEO: In this SD-WAN collaboration demonstration, 4 key features are being shown, including: how to access and maintain a multi-cloud scenario, the security you have within the SD-WAN, and 2 more. Download this video to learn more about these features.
Posted: 12 May 2020 | Premiered: 12 May 2020

Oracle Communications

Farsight DNSDB Overview
sponsored by Farsight Security
VIDEO: The internet is powered by the domain name system, also known as DNS. In this short video, learn about DNS and how Farsight Security’s DNSDB can help security professionals gain global DNS visibility.
Posted: 24 Nov 2020 | Premiered: 13 Mar 2018

Farsight Security

Avoiding Top 3 Security Challenges of Digital Transformation
sponsored by Menlo Security
WEBCAST: In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.
Posted: 20 Mar 2020 | Premiered: Mar 20, 2020

Menlo Security

Machine-Learning Capabilities within Network Detection & Response
sponsored by Fidelis
PODCAST: In this podcast, Fidelis’ COO, Craig Harber, and Data Science Manager, Abhishek Sharma, discuss how NDR begins with detections, and the role of machine-learning within NDR.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

Fidelis

Cloud Security Guardian Integration with Microsoft Azure 2019
sponsored by Barracuda
VIDEO: Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.
Posted: 08 Oct 2019 | Premiered: 31 Jul 2019

Barracuda

Consolidate resources with IBM Virtualization
sponsored by IBM
VIDEO: This video describes how making the transition from physical to virtual resources with IBM Virtualization has the potential for significant savings.
Posted: 19 May 2011 | Premiered: 08 Apr 2010

IBM

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info