IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Electronic Signatures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Sign, e-Signatures, Signatures, esign
DEFINITION: The electronic equivalent of a hand-written signature requiring user authentication, such as a digital certificate, smart card or biometric method for verification.
Electronic Signatures Multimedia (View All Report Types)
151 - 175 of 468 Matches Previous Page  |  Next Page
How Microsoft Enables The Anywhere Workplace
sponsored by Data#3
VIDEO: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

Data#3

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
VIDEO: In this video, an information security expert discusses the results of his research to reveal hackers' most common motives and techniques.
Posted: 08 Jul 2015 | Premiered: 08 Jul 2015

Dell SecureWorks

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

How to Benefit from Analyzing Virtualization Performance
sponsored by SearchServerVirtualization
VIRTUAL ENVIRONMENT: Culling the right performance data, from both physical and virtual servers, is a challenge unto itself; however, it's a challenge made all the more complicated when there's also no clear consensus on the tools and techniques for monitoring this performance. Luckily, this classroom can help.
Posted: 28 Jul 2014 | Premiered: 29 Jul 2014

SearchServerVirtualization

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

How VMware enables The Anywhere Workplace
sponsored by Data#3
VIDEO: When developing and implementing a new enterprise mobility strategy, what capabilities are most important to you? This animated video highlights one such all-in-one enterprise mobility strategy service, including advice on how to successfully implement SaaS and SSO in your business.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

Data#3

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

HP and United: Teaming together for a successful migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief video case study, learn how United Airlines achieved a quick IT migration of a large size and scale – all without impact from a technology perspective.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

High Performance Graphics for Virtual Desktops
sponsored by NVIDIA/VMware
VIDEO: Graphics-rich apps are more popular than ever—but they require better VDI. Learn about the best offerings on the market.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Data Systems

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Data Systems
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Data Systems

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

How to Limit the Risk of Attack on your XP Assets
sponsored by AlienVault
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AlienVault

How to Make Virtual Desktop Security Simpler and More Scalable
sponsored by Citrix
WEBCAST: It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users.
Posted: 26 Apr 2011 | Premiered: Apr 25, 2011

Citrix

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

How You Can Leverage CA 3Tera AppLogic
sponsored by CA Technologies.
VIDEO: Watch this video and learn how you can leverage CA 3Tera AppLogic to roll out new business applications and services faster than you thought was possible. Bring the power of the cloud to your company.
Posted: 22 Mar 2011 | Premiered: 22 Mar 2011

CA Technologies.

HP Business Service Management
sponsored by Hewlett-Packard Company
WEBCAST: HP Business Service Management solutions enable your IT organization to monitor and maintain the health of the key business services and processes it supports, and to make improvements to those processes to better support the business.
Posted: 04 Feb 2011 | Premiered: Feb 4, 2011

Hewlett-Packard Company

HP GlancePlus
sponsored by Hewlett-Packard Company
TRIAL SOFTWARE: Keep business applications running smoothly and efficiently. HP GlancePlus software arms your organization with powerful system performance monitoring and diagnostic capabilities. It enables you to easily examine system activities, identify and resolve performance bottlenecks, and tune your system for more efficient operation.
Posted: 07 Oct 2010 | Premiered: 07 Oct 2010

Hewlett-Packard Company
151 - 175 of 468 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement