IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Asymmetric Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Asymmetric Cryptography Multimedia (View All Report Types)
 
Demo of OptioAware by OptioLabs
sponsored by OptioLabs
VIDEO: View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.
Posted: 25 Mar 2016 | Premiered: 21 Dec 2015

OptioLabs

Simplify IT Management, Simplify Your Life
sponsored by Dell, Inc. and IntelĀ®
VIDEO: Watch this light-hearted video to find out what happens when a new IT guy joins an office that uses the combination of Dell, Citrix, and Intel technology to power its organizations desktops and see how this technology landscape impacts the IT department.
Posted: 21 Jan 2016 | Premiered: 21 Jan 2016

Dell, Inc. and IntelĀ®

Gaining Cloud Efficiencies for Northern Ireland
sponsored by Hewlett-Packard Enterprise
VIDEO: In this video case study, explore how the public sector in Northern Ireland was able to meet the growing complexity of computing needs by partnering with HPE Helion. Inside, see how they are now able to effectively scale their computing power needs, enable efficient data access to everyone, and save big on infrastructure costs.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Top 10 Emerging Trends and Their Impact on Your IT Operation
sponsored by Gartner
WEBCAST: In this exclusive presentation, David Cappuccio, VP Distinguished Analyst at Gartner, highlights the top 10 emerging technology trends and examines their impact on your IT infrastructure and operations. Tune in to see which trends you should keep an eye on, including edge computing, bimodal IT, and more.
Posted: 15 Apr 2016 | Premiered: Dec 31, 2015

Gartner

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Why Digital Transformation Is Changing the Role of the Data Center
sponsored by Dimension Data
PODCAST: In this exclusive podcast, Brian Glick, Editor-in-Chief at Computer Weekly, reveals how affecting digital transformation in your enterprise will change the role of the data center. Listen now to ensure competitive longevity by modernizing your data center architectures with cloud-enabled, scalable technology deployment.
Posted: 28 Mar 2016 | Premiered: Mar 23, 2016

Dimension Data

How Digital Transformation Is Changing the Role of the Data Center
sponsored by Dimension Data
VIDEO: In this exclusive webcast, Editor-in-Chief at Computer Weekly Brian Glick demonstrates how digital transformation is significantly affecting the role of the enterprise data center. Tune in to ensure competitive longevity by modernizing your data center architectures with cloud-enabled, scalable deployments.
Posted: 18 Mar 2016 | Premiered: 18 Mar 2016

Dimension Data

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: Listen in as four senior health IT professionals explore the top security priorities and projects being grappled with in healthcare today, and the strategies that you can adopt to keep your patients' medical information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Keep Data Safe, Whether at Rest or in Motion
sponsored by Riverbed Technology, Inc.
WEBCAST: Learn how the right technology ensures data remains safe when transported to enterprise data centers.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement