IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

DSRC

RSS Feed    Add to Google    Add to My Yahoo!
DSRC Multimedia (View All Report Types)
 
What to Do When Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


University Achieves Stress-Free VDI Deployment
sponsored by Tintri
WEBCAST: After starting their virtual desktop project, WWU saw performance issues and couldn't get the IOPS needed from their legacy environment. The IT team tested six different storage platforms to find the one best fit for their VMware desktops. Watch this webcast now to hear which storage platform WWU chose for its campus-wide VDI deployment.
Posted: 11 Jun 2015 | Premiered: Jun 11, 2015

Tintri

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

Why is Schneider Electric the Right Choice for Prefabricated Data Centers?
sponsored by Schneider Electric
VIDEO: So why is Schneider Electric the right choice for prefabricated data centers? This video examines the proven experience, broad offering of prefab modules, detailed designs, and industry-leading, integrated DCIM software that put Schneider Electric ahead when it comes to prefabricated data centers.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement