IT Management  >   Systems Operations  >   Security  >  

3A

RSS Feed    Add to Google    Add to My Yahoo!
3A Multimedia (View All Report Types)
 
Customer Success Story: Unisys Video Case Study
sponsored by SecureAuth
VIDEO: This case study details how one company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 25 Jan 2016 | Premiered: 25 Jan 2016

SecureAuth

SecureAuth - Houston Methodist
sponsored by SecureAuth
VIDEO: In this video, you will learn how to quickly and easily secure your authentication process for your employees to access both existing and new technologies. Move your business into the cloud with confidently and securely.
Posted: 21 Jan 2016 | Premiered: 15 Jan 2015

SecureAuth

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

The Crucial Security Role of a Cloud Directory
sponsored by Microsoft
WEBCAST: In this webcast, independent analyst and blogger Jack Madden takes a closer look at how a cloud directory can play a crucial security role in user and identity management for mobile and beyond.
Posted: 18 Jan 2016 | Premiered: Jan 18, 2016

Microsoft

How to Stop Cyber Attacks Using Adaptive Authentication
sponsored by SecureAuth
WEBCAST: This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.
Posted: 24 Jan 2016 | Premiered: Dec 2, 2015

SecureAuth

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
3A White Papers | 3A Multimedia | 3A IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement