IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Barcoding

RSS Feed    Add to Google    Add to My Yahoo!
BarcodingMultimedia (View All Report Types)
 
Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Cyber Security Tips from a Customer like You
sponsored by Palo Alto Networks
WEBCAST: In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense.
Posted: 27 Dec 2013 | Premiered: Dec 27, 2013

Palo Alto Networks

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Systems of Engagement: The Future of Enterprise IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, Forrester Research Vice President and Principal Analyst John McCarthy describes how systems of engagement are shaping the future of enterprise IT. Tune in to learn more today.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement