Secure WebcastWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Webcast returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Mobile Device Management
 •   Virtualization
 •   Data Center Management
 •   Application Security
 •   Wireless Security
 •   Security Policies

Related Searches
 •   Firms Secure Webcast
 •   Group Secure Webcast
 •   Method Secure Webcast
 •   Operational Secure Webcast
 •   Sample Secure Webcast
 •   Secure Webcast Buys
 •   Secure Webcast Claims
 •   Secure Webcast Decisions
 •   Secure Webcast Frameworks
 •   Simple Secure Webcast
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobilizing Lotus Domino by Sybase iAnywhere

April 26, 2007 - (Free Research)
Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email. 
(WEBCAST) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 12, 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

Simplifying Data Centers & Storage Area Networks by Creating a Virtual Infrastructure Layer by OnPATH Technologies

June 2008 - (Free Research)
A virtual infrastructure layer can help your organization adapt to the dynamic needs of a virtualized data center by providing a more secure environment that enables a hands-off approach to managing the SAN. This Webcast provides an overview of the... 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Challenges of Securing a Smarter Planet by IBM

December 2010 - (Free Research)
In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Security Practices for Vmware by Vyatta Inc.

June 2012 - (Free Research)
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems. 
(WEBCAST) READ ABSTRACT |

Data Protection for Virtual Environments Webcast by Quantum Corporation

September 2009 - (Free Research)
In this webcast, Greg Schulz, Founder and Senior Analyst at The StorageIO Group, and Randy Glissman, Solutions Marketing Manager at Quantum, explore solutions for virtual server data protection and discuss general data center trends and perspectives. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

MDM is Not Enough - Secure Mobile File Sharing with Acronis Access by Acronis

March 2014 - (Free Research)
This informative webcast examines a file syncing and sharing solution that allows mobile workers to share and access the applications and data they need to be productive and efficient while maintaining the highest levels of enterprise security. 
(WEBCAST) READ ABSTRACT |

Top four considerations for securing Microsoft SharePoint by Sophos, Inc.

March 2011 - (Free Research)
This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Strategies for Creating a Secure and Flexible Hybrid Cloud Environment by Layered Tech

April 2010 - (Free Research)
This transcript of the "Strategies for Creating a Secure and Flexible Hybrid Cloud Environment" webcast explores the trend toward hybrid cloud computing. Gain insight into how it integrates the benefits of both virtualization and dedicated servers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Building Secure Private Clouds with VMware vCloud Director by VMware, Inc.

April 2011 - (Free Research)
VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services. 
(WEBCAST) READ ABSTRACT |

Enterprise Systems: The servers, storage and software at the core of an enterprise IT infrastructure by IBM

June 2013 - (Free Research)
This brief and helpful webcast takes a look at a private cloud solution that can help your organization meet the critical challenges of today's business and IT world by providing new levels of agility and efficiency while remaining secure and available. 
(WEBCAST) READ ABSTRACT |

Secure DNS Prevents DDoS Attacks by Neustar®

March 2014 - (Free Research)
This informative webcast discusses why DNS has become a favorite target for DDoS attacks and how a hardened DNS combined with cloud-based protection can provide the shield your organization needs. 
(WEBCAST) READ ABSTRACT |

Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop by VMware, Inc.

August 2012 - (Free Research)
This webcast explores the issues with enabling BYOD in the workplace and provides details of a desktop virtualization-based solution that will help you securely support device diversity, mobile workers, and BYOD initiatives. 
(WEBCAST) READ ABSTRACT |

Cognos Disclosure Management - Demo Video by IBM

September 2013 - (Free Research)
Watch this fascinating webcast to learn about Cognos Disclosure Management – a single, dynamic reporting solution that ensures secure integration with enterprise data sources, data consistency, standardized processes, quick responses, and greater opportunities. 
(WEBCAST) READ ABSTRACT |

College Board Case Study: Quality Software is Secure Software by IBM

July 2013 - (Free Research)
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe. 
(WEBCAST) READ ABSTRACT |

Secure Cloud Access Reference Architecture Model by Intel

May 2011 - (Free Research)
Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more. 
(WEBCAST) READ ABSTRACT |

Desktop Management Made Easy with VMware Horizon View and Mirage by VMware, Inc.

February 2014 - (Free Research)
This webcast examines a tool that ensures mobile users can work productively from home or on the go, while also ensuring the corporate environment remains manageable and secure. 
(VIDEO) READ ABSTRACT |

Efficient SAN Based Tape Encryption with Curtis Preston by Cisco Systems, Inc.

December 2008 - (Free Research)
Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications. 
(WEBCAST) READ ABSTRACT |

The New Campus Network is Simply Connected by Juniper Networks, Inc.

May 2011 - (Free Research)
View this webcast and learn about Juniper’s recommendation for building a device and application agnostic network, which is simpler, higher performing and more secure, in an increasingly more mobile user setting. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts