IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography Multimedia (View All Report Types)
 
Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

Internet of Things Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School examines how security professionals can ensure that IoT devices do no harm to enterprise security.
Posted: 26 Apr 2016 | Premiered: 01 May 2016

SearchSecurity.com

Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software
sponsored by Commvault
VIDEO: Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.
Posted: 09 May 2016 | Premiered: 16 Oct 2015

Commvault

Analyst Perspective: How Smart Businesses Use the Cloud
sponsored by Commvault
VIDEO: In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

HPE BladeSystem Innovations: 20Gb Adapter
sponsored by HPE and Intel®
VIDEO: Tune into this video to discover the latest 20Gb converged fabric adapter that will empower your business to run faster IT from the local data center and fulfill all SLAs. View now to drive virtualization and other application workloads to new performance limits by delivering 20Gb connectivity between blade servers.
Posted: 23 Jun 2016 | Premiered: 25 May 2016

HPE and Intel®

LOGICcards Overview: Delivering Real-time Insights to MSPs and ITSPs
sponsored by LogicNow
VIDEO: In this brief video, learn more on how LOGICcards can allow MSPs and IT professionals to create predictive observations that are translated into proactive actions you can take to make your customers' IT systems work better and more efficiently.
Posted: 11 Apr 2016 | Premiered: 11 Apr 2016

LogicNow

Hyper Convergence in the Era of Always-On Business
sponsored by HPE and Veeam
WEBCAST: In this expert webcast, discover why hyper convergence remains such a big deal for virtualized environments—and separate fact from vendor hype. Tune in to examine how hyper convergence-based data center modernization will help you set the stage for high availability and rapid recoverability.
Posted: 06 Apr 2016 | Premiered: Mar 23, 2016

HPE and Veeam

Remote Systems Monitoring for Power and Cooling
sponsored by Emerson Network Power
VIDEO: Discover in this video how to leverage data center remote monitoring to evaluate the health and status of your critical power and cooling equipment. Tune in to capture critical system performance data and turn it into actionable insights with alarm notifications, custom escalation plans, and proactive diagnostics.
Posted: 07 Jun 2016 | Premiered: 19 Jan 2011

Emerson Network Power

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement