IT Management  >   Systems Operations  >   Security  >   AAA  >  

Accounting (Security)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The process of collecting information on resource usage for the purpose of trend analysis, auditing, billing, or cost allocation.
Accounting (Security) Multimedia (View All Report Types)
101 - 125 of 541 Matches Previous Page  |  Next Page
Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Creating a Ready-for-Digital infrastructure with Axway API Gateway
sponsored by Axway
WEBCAST: Discover how Scania found a simple, secure way to move applications between zones. Explore the capabilities of the API gateway they adopted and how it streamlined their day-to-day operations.
Posted: 09 Jun 2016 | Premiered: Feb 11, 2016

Axway

Cybercrime: Don't Let End Users Be Your Weakest Link
sponsored by Dimension Data
WEBCAST: Cybercriminals are now attacking end users directly. Learn to use policy and education to keep your company safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

Cybersecurity truth: Protection isn't enough
sponsored by Verizon
VIDEO: Access this short video to learn about improving your incident response time, and to gain access to the 2016 Data Breach Investigation Report.
Posted: 05 Jul 2016 | Premiered: 02 May 2016

Verizon

Data Center Thermal Management Services: A Brief Video
sponsored by Emerson
VIDEO: As energy prices continue to soar, data center managers explore each avenue for reducing energy consumption and cutting costs. Tune into this brief video to strategize your data center thermal management and discover if your IT admins should utilize indirect evaporative freecooling and adiabatic freecooling in your mission-critical facility.
Posted: 10 Jun 2016 | Premiered: 29 Jan 2015

Emerson

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Data Loss Prevention: Protecting the Data that Matters
sponsored by Dimension Data
WEBCAST: The integrity of your business relies on data protection. Learn the key steps to keeping your data safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Deliver Secure Access to Cloud, Mobile, Windows Apps from Any Device
sponsored by VMware, Inc.
VIDEO: This brief video shows a single platform that integrates identity, application, and enterprise mobility management to securely deliver data and apps to any mobile device.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Contact Us: SQL Server Offer
sponsored by Microsoft
WEBCAST: Ready to migrate to SQL Server? Discover support services that will help to smoothly and quickly begin your transition.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Microsoft

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Enterprise and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Enterprise and Intel ®

Converged Infrastructure Trend 3- Software-defined Data Centers
sponsored by Hewlett-Packard Enterprise and Intel ®
VIDEO: This brief on-demand webcast provides information about the software-defined data center, explaining what this converged infrastructure trend is and how it can benefit your organization. Also inside, learn about the role of software-defined networking (SDN).
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

Hewlett-Packard Enterprise and Intel ®

Coping with grassroots IT innovation
sponsored by AppSense
WEBCAST: Employees today are trying to create their own solutions to practical IT challenges they face on a day-to-day basis, which can present challenges to the IT department. Learn how your organization can harness the key elements of this user-driven IT innovation in a way that complements current infrastructure and practices.
Posted: 26 Jun 2012 | Premiered: Jun 20, 2012

AppSense

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management
sponsored by Commvault
WEBCAST: This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

Commvault

Customer Testimonial: Levi's
sponsored by Commvault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

Commvault

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Data Deduplication FAQ Podcast
sponsored by Quantum Corporation
PODCAST: This expert Podcast, featuring Jerome Wendt, President and Lead Analyst of DCIG, Inc. puts an end to the confusion by offering insights to the most commonly asked questions he hears in the field today.
Posted: 19 Dec 2007 | Premiered: Aug 12, 2008

Quantum Corporation

Data Loss Prevention (DLP) Solutions Spotlight
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 23 Sep 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

Deep Defender Demo Video
sponsored by Intel
WEBCAST: Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel
101 - 125 of 541 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement