IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography Multimedia (View All Report Types)
 
Big Data Management: One Fast Query on All Your Data
sponsored by Oracle Corporation
VIDEO: Access this video to learn about a big data management strategy that can work seamlessly with Hadoop and NoSQL. Discover a way to gain access to a much bigger pool of data and maintain security, all for a lower TCO than building your own cluster.
Posted: 29 Jan 2016 | Premiered: 19 Nov 2014

Oracle Corporation

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Gaining Cloud Efficiencies for Northern Ireland
sponsored by Hewlett-Packard Enterprise
VIDEO: In this video case study, explore how the public sector in Northern Ireland was able to meet the growing complexity of computing needs by partnering with HPE Helion. Inside, see how they are now able to effectively scale their computing power needs, enable efficient data access to everyone, and save big on infrastructure costs.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Get Real-Time Threat Detection
sponsored by AlienVault
PRODUCT DEMO: A successful unified security management (USM) approach can help you discover all IP-enables assets on your network, identify vulnerabilities and malware quickly, and much more.
Posted: 01 Apr 2016 | Premiered: 01 Apr 2016

AlienVault

Adaptive Mobile Protection: The need for user endpoint context
sponsored by Aruba Networks
WEBCAST: This webcast teaches you about the changing threat landscape and best practice you should implement for top notch mobile security.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Cloudian HyperStore 101
sponsored by Cloudian
VIDEO: This webcast provides an overview of an object storage system that uses commodity servers to build highly scalable and distribute storage. Watch now to discover how Cloudian's "hyperstore" technology operates and how it can scale to support all of your applications.
Posted: 11 Apr 2016 | Premiered: 09 Sep 2015

Cloudian

Case Study: Christie Digital Protects Big Data
sponsored by Commvault
VIDEO: In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.
Posted: 28 Apr 2016 | Premiered: 18 Nov 2015

Commvault

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and IntelĀ®
VIDEO: In this discussion among experts, learn why healthcare companies that avoid virtualization are losing ground.
Posted: 11 Dec 2015 | Premiered: 11 Dec 2015

TOPICS:  IT Management
Dell, Inc. and IntelĀ®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement