Unstructured Threats Multimedia

(View All Report Types)
2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

IT Priorities 2018 - What's happening in security?
sponsored by TechTarget ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 08 Feb 2021 | Premiered: 02 May 2018

TechTarget ComputerWeekly.com

IT Priorities 2018 - What are UK IT managers spending their budgets on?
sponsored by TechTarget ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, talks us through the key areas that IT managers in the UK are planning on spending their budgets on. Results and statistics are taken from Computer Weekly's 2018 IT Priorities survey in which over 250 IT decision makers took part.
Posted: 08 Feb 2021 | Premiered: 02 May 2018

TechTarget ComputerWeekly.com

AI-Native SOC Summit
sponsored by CrowdStrike
WEBCAST: Today’s adversaries are moving at blinding speed. Yet, traditional approaches to security operations are built on slow, complex, and costly SIEMs that were designed for yesterday’s security environment. Tune into the AI-Native SOC Summit to learn how to evolve to an automation-first mindset and access next-gen SIEM.
Posted: 08 Nov 2024 | Premiered: Nov 8, 2024

CrowdStrike

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

Symantec Corporation

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

Orion Network Configuration Manager (NCM)
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.
Posted: 14 Jul 2009 | Premiered: 14 Jul 2009

SolarWinds, Inc.

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.