IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography Multimedia (View All Report Types)
 
The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

Fundamentals of Application Release and Deployment
sponsored by IBM
WEBCAST: This webcast discusses strategies for automating the construction of applications as well as release and deployment.
Posted: 20 Jul 2015 | Premiered: Jun 19, 2014

IBM

AWS Partner Webcast - Use AWS CloudTrail Data and Splunk Software to Improve Security and Compliance
sponsored by Splunk
WEBCAST: Watch this webcast to learn how you can use AWS CloudTrail Data and Splunk Software to improve security and compliance in your AWS environment.
Posted: 21 Aug 2015 | Premiered: May 23, 2014

Splunk

Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014

Splunk

Enterprise MAM Takes Center Stage: The Next Chapter in Mobile Strategy
sponsored by Apperian, Inc.
WEBCAST: In this webcast, Gartner Research Director Chris Silva and Steven Wheat, Chief Information Technology Architect at Emory Healthcare, look at how organizations use mobile application management to securely deliver mobile apps. Tune in now to key into these can't-miss MAM strategies.
Posted: 17 Aug 2015 | Premiered: Aug 17, 2015

Apperian, Inc.

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Public Cloud: 4 Factors to Consider Before Migration
sponsored by Data#3
VIDEO: This short video explores what you should keep in mind when planning the move to public cloud resources in order to obtain a true cost picture.
Posted: 30 Jun 2015 | Premiered: 30 Jun 2015

Data#3

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement