IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >  

Automatic Data Collection

RSS Feed    Add to Google    Add to My Yahoo!
Automatic Data Collection Multimedia (View All Report Types)
 
Next-Gen Autentication
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security classroom explores the latest in authentication methods and technologies.
Posted: 23 Sep 2016 | Premiered: 15 Sep 2016

SearchSecurity.com

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: Empower a mobile workforce with secure access to apps and data from a diverse set of mobile devices. Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

Citrix

Expert guidance for DCIM: Data Center Information Management Solutions
sponsored by Schneider Electric
PODCAST: How can you ensure that your DCIM implementation will be a success? Tune into this podcast to discover how you can avoid the common pitfalls of DCIM software implementation and ensure the success of your DCIM strategy, and learn how to leverage scalable, modular architecture with strong vendor support.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How Box Platform Helps Businesses Build Better Apps
sponsored by Box
WEBCAST: Discover how to build better apps that ease secure content sharing within and outside of your enterprise. Tune in to overcome cumbersome content sharing, and discover how content Platform-as-a-Service can transform your organization—from outside users to IT.
Posted: 16 May 2016 | Premiered: May 16, 2016

Box

Take the First Steps Toward Effective SIAM
sponsored by ServiceNow
VIDEO: In this brief video, an industry expert explains why an effective Service Integration and Management (SIAM) function is more than just vendor management. Tune in for best practices on how to get started with SIAM.
Posted: 26 Feb 2016 | Premiered: 27 Nov 2015

ServiceNow

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

A Brazilian company adopts IBM System z to handle rapid business growth
sponsored by IBM
WEBCAST: This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
Posted: 21 Feb 2014 | Premiered: May 29, 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement