IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automated Data Capture

RSS Feed    Add to Google    Add to My Yahoo!
Automated Data Capture Multimedia (View All Report Types)
Next-Gen Autentication
sponsored by
VIRTUAL ENVIRONMENT: This Security classroom explores the latest in authentication methods and technologies.
Posted: 23 Sep 2016 | Premiered: 15 Sep 2016

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006


Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Your Pathway to the Composable Infrastructure
sponsored by NTT ICT
WEBCAST: In this CeBIT Conference video, hear from Paul Miller, VP of Marketing Converged Data Center Infrastructure at HPE, as he examines the performance and resource management potential of the composable infrastructure. Watch now and discover what this infrastructure approach can do for your business.
Posted: 10 Aug 2016 | Premiered: Mar 18, 2016


Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014


EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement