IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Asymmetric Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Asymmetric Cryptography Multimedia (View All Report Types)
 
Passwords Are Out: But What's Replacing Them?
sponsored by Crossmatch
PODCAST: Join experts Keven Beaver and Jeff Carpenter in this podcast as they discuss why passwords are obsolete and what the "human-proofed" future of IAM and authentication will look like.
Posted: 25 Jul 2017 | Premiered: Jun 30, 2017

Crossmatch

Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication
sponsored by Centrify Corporation
PRODUCT DEMO: Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Advancing Infratsructure to Containers and Beyond
sponsored by CoreOS
WEBCAST: Security has become a relative phrase. We may think we're secure, but it only ever takes that one bug to bring your organization down. It's time to think about security in a new way. Watch this lecture from CoreOS CEO Alex Polvi, and find out how containers could help your organization stay secure.
Posted: 30 May 2017 | Premiered: May 24, 2017

TOPICS:  Security
CoreOS

Digital Journey with DevOps
sponsored by Atos
VIDEO: IT will play an increasingly ambitious role in the years to come. As we push forward with digital transformation, DevOps will step into the spotlight. This webcast highlights the importance of DevOps practices and the role this new way of computing will improve the customer journey.
Posted: 21 Jun 2017 | Premiered: 23 Nov 2016

Atos

Mobile device Management - Keep up with your mobile workforce
sponsored by Snow Software
VIDEO: Discover a device manager that has combined EMM and software asset management to minimize the impact of mobility on the service desk and deliver a safe environment for employees to use sensitive information and apps on mobile devices.
Posted: 20 Mar 2017 | Premiered: 26 Nov 2015

Snow Software

What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant
sponsored by CA Technologies.
WEBCAST: Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help.
Posted: 11 Sep 2017 | Premiered: Sep 6, 2017

CA Technologies.

Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

How IoT-Powered Smart Offices Boost Efficiency and Innovation
sponsored by Aruba Networks
VIDEO: Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.
Posted: 05 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

Magic Quadrant for Data Center Backup and Recovery Software
sponsored by IBM
WEBCAST: Discover the strengths and cautions for the vendors in the Data Center Backup and Recovery Software Magic Quadrant.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Meeting Your Banking Needs
sponsored by Hewlett-Packard Enterprise
VIDEO: Find out how to deliver a better, digital customer experience without increasing costs or replacing your legacy systems.
Posted: 08 Feb 2017 | Premiered: 08 Feb 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement