IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Barcoding

RSS Feed    Add to Google    Add to My Yahoo!
Barcoding Multimedia (View All Report Types)
 
Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Software-Defined Parallel Powered Productivity
sponsored by DataCore Software Corporation
WEBCAST: Data storage isn't easy - data keeps growing, apps need more performance and new servers are hard to integrate and manage. Rather than continuously adding servers in attempt to solve your IT challenges, learn to exploit the full potential of your storage infrastructure and minimize I/O performance gaps through software-based storage virtualization.
Posted: 09 Aug 2016 | Premiered: Aug 8, 2016

DataCore Software Corporation

APIs: Bridging the Bimodal IT Gap
sponsored by TIBCO Software Inc.
WEBCAST: This webcast explores the concept of bimodal IT examines how APIs can connect its two sides, aligning their different cultures, speeds, strategies, and governance. Discover how APIs help expose critical data and open up its availability, creating an interface for Agile development and IT services.
Posted: 18 Nov 2016 | Premiered: Nov 18, 2016

TIBCO Software Inc.

Gain Insights in an Instant with Integrated Infrastructure
sponsored by IBM
VIDEO: Tune into this brief video to learn from Steve Duplessie, ESG Founder & Senior Analyst, about an integrated infrastructure that's designed to deliver high levels of ease, efficiency, and versatility across the IT estate. Additionally, discover the top 6 reasons companies turn to integrated, full stack solutions.
Posted: 24 Oct 2016 | Premiered: 27 Jul 2015

IBM

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement