Managed Security WebinarWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Managed Security Webinar returned the following results.
RSS What is RSS?
Related Categories

 •   Managed Security Services
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Application Security
 •   Endpoint Security
 •   Wireless Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Lifecycle Management(ALM)
 •   Vulnerability Assessment

Related Searches
 •   Calendar Managed Security
 •   Charts Managed Security
 •   Contract Managed
 •   Functions Managed Security Webinar
 •   Managed Security Device
 •   Managed Security Networking
 •   Managed Security Webinar Presentation
 •   Manual Managed Security
 •   Reservation Managed
 •   System Managed Security Webinar
Advertisement

ALL RESULTS
1 - 25 of 427 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 27, 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Why Managed DNS Services and Why Now? by Verisign, Inc.

June 03, 2011 - (Free Research)
In this webinar Yankee Group presents its Managed DNS Service Bill of Rights - what Enterprises need to expect and demand from a managed DNS service provider. 
(WEBCAST)

WAN Security: Making the Right Choices for an Optimized WAN by XO Communications

April 30, 2012 - (Free Research)
This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise. 
(WEBCAST) READ ABSTRACT |

Taking Managed Security Services To The Next Level by Webroot

October 31, 2013 - (Free Research)
This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges. 
(WHITE PAPER) READ ABSTRACT |

Webinar: Implementing Powerful IT Search on the Cloud by RightScale

March 01, 2010 - (Free Research)
Traditional, static approaches to managing IT data simply aren't built for the cloud. In this webinar, Splunk provides an alternative that is dynamic and easily deployed using the RightScale Platform. 
(WEBCAST) READ ABSTRACT |

Why Cloud-Based Security and Archiving Make Sense by Google Postini

June 03, 2010 - (Free Research)
Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both. 
(WEBCAST) READ ABSTRACT |

Building Mission Critical Wireless for Apple Devices by Extreme Networks (E-mail this company)

January 13, 2014 - (Free Research)
This exclusive presentation discusses how you can best manage mobile devices on your network so that users get the services they want and IT gets the control it needs. While this webinar specifically addresses iOS devices, it's lessons can also be applied to the other leading mobile platforms. 
(WEBCAST) READ ABSTRACT |

Information Security Magazine - March 2013 by SearchSecurity.com

March 01, 2013 - (Free Research)
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more. 
(EZINE) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 31, 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

Snapshot Management – Ask the Educator Series by CommVault Systems, Inc.

March 05, 2014 - (Free Research)
This webinar goes over the downsides of legacy data backup and protection methods and highlights the benefits of Simpana IntelliSnap Technology, 
(WEBCAST) READ ABSTRACT |

Discover the Risks and Rewards Behind a Mobile Workforce by SearchSecurity.com

April 22, 2013 - (Free Research)
Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively. 
(EGUIDE) READ ABSTRACT |

Maintaining security in managed services by SearchSecurity.com

December 05, 2011 - (Free Research)
Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model. 
(EGUIDE) READ ABSTRACT |

Managing Cloud Computing Risk by SearchSecurity.com

April 11, 2012 - (Free Research)
Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk. 
(EGUIDE) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by SearchSecurity.com

October 18, 2013 - (Free Research)
Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland. 
(EGUIDE) READ ABSTRACT |

IT Handbook: Security Best Practices for Server Virtualization by SearchSecurity.com

August 09, 2011 - (Free Research)
Without the right plan for managing security, much of your proprietary data and  information is at great risk. Access this expert resource, from the editors at SearchServerVirtualization.com, to learn the essential best practices for maintaining security in your virtualized data center. 
(EBOOK)

Emerging PaaS security tactics by SearchSecurity.com

May 02, 2012 - (Free Research)
Like all other cloud deployments, PaaS introduces some security concerns because of underlying security features that are beyond the customer’s control. This e-guide explores these challenges and lists security areas that can affect the risk profile of deployed applications, as well as offers key advice for mitigating risk. 
(EGUIDE) READ ABSTRACT |

E-Guide: Cloud computing security - Infrastructure issues by SearchSecurity.com

May 26, 2011 - (Free Research)
While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services by SearchSecurity.com

March 14, 2012 - (Free Research)
Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management by eEye Digital Security

July 09, 2010 - (Free Research)
In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Webinar: Why Top Social Game Companies Are Moving to the Cloud with RightScale by RightScale

February 24, 2010 - (Free Research)
Watch this webinar and you will walk away with a better understanding of how RightScale can help you manage the challenges and opportunities in the social game industry. 
(WEBCAST) READ ABSTRACT |

Webinar: Create Secure Test and Dev Environments in the Cloud by RightScale

February 24, 2010 - (Free Research)
In this webinar, you will lean how to operate your entire application testing infrastructure in the cloud to save time and money – enabling you to test more extensively and quickly hand off projects from development to operations. 
(WEBCAST) READ ABSTRACT |

Numara Software Webinar - Track It! by Numara Software

June 08, 2009 - (Free Research)
Watch this webinar to get an overview of Numara's Track It! software solution and free trial download that offers everything needed to manage your Help Desk and IT assets while enabling your organization to cost-effectively employ industry best practices. 
(WEBCAST) READ ABSTRACT |

Web Services and Data Integration Across Heterogeneous Data Sources by Progress DataDirect

March 18, 2009 - (Free Research)
During this webinar we wrote, tested and deployed real XML and XQuery-based solutions. 
(WEBCAST) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 19, 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 427 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts