Search Results for: firewall webcast

How to Implement Network Microsegmentation
Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.

NTT Com Security (UK) Ltd

How the Basics of Network Security Have Evolved
In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

Fortinet, Inc.

Expert Ebook: Mastering PCI
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud.

Google Apps

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud.

Google Apps

How Etsy's DevOps Teams Fend off Fraudsters
In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.

BMC

Cloud Migration Checklist: The Enterprise Guide
Migrating an enterprise's data and applications to the cloud includes a laundry list of considerations – from tools and costs to security. Learn six tasks that should be included on your checklist to ensure a successful cloud migration strategy.

Attenda

Mobile: The Technology Game-Changer in 2013
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

TechTarget Security

Networking Engineering in Extraordinary Places
In this edition of the Network Evolution e-zine, find out how network locations dictate the need to adapt to new and sometimes unusual challenges.

TechTarget Networking

The Top Threat Intelligence Services For Enterprises
If threat intelligence is right for you, this e-guide will help you get started with a list of top threat intelligence products on the market today and how to choose the right one for your needs.

UnitedLex