IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
CryptographyMultimedia (View All Report Types)
 
Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

Surveying the Cloud Service Provider Landscape
sponsored by Internap
VIDEO: In this webinar, you'll survey the cloud service provider landscape and get insight into the different types of vendors based on the strategic value that they can bring to businesses buying cloud services. You'll also examine how hybridization is shaping cloud deployment strategies.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Internap

Modern Business Needs VDI to Soar
sponsored by VCE
VIDEO: Access this video to explore how VDI has changed over the years. Discover how a virtualization technology is partnering with a leading converged infrastructure solution to create a scalable, secure, high performing VDI solution and allowing for seamless transition into centrally managed, secure workspaces.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE

Don't Let Legacy Infrastructure Be Your Legacy
sponsored by Red Hat
VIDEO: This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud

What is the impact to businesses when their web infrastructure is attacked?
sponsored by Akamai Technologies
VIDEO: Edward S Ferrara, Vice President & Principal Analyst at Forrester delves into the direct and indirect costs of attacks. To prepare yourself for attacks, download and view this video as a resource to refer to later when arming yourself against hackers.
Posted: 07 Nov 2014 | Premiered: 03 Nov 2014

Akamai Technologies

Diary of a Healthcare CISO
sponsored by Core Security Technologies
WEBCAST: This exclusive webcast explores the most pressing challenges and security risks in the healthcare information security landscape today.
Posted: 15 Dec 2014 | Premiered: Dec 15, 2014

Core Security Technologies

Day in the life of StruxureWare For Data Centers CIO
sponsored by APC by Schneider Electric
VIDEO: Keep your finger on the pulse on one or many data centres through StrxureWare from Schneider electric. Monitor the facilities and stay updated on the mechanical and electrical utilizations via an easy to navigate dashboard.
Posted: 05 Nov 2014 | Premiered: 03 Jul 2013

APC by Schneider Electric

Tata Communications Speaks to Bill Haskins, Senior UC Analyst
sponsored by TATA Communications
VIDEO: In this video, Senior Unified Communications Analyst Bill Haskins explains how UC is used today and what is projected for the future.
Posted: 06 Nov 2014 | Premiered: 16 Jul 2013

TATA Communications

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement