IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Identity Management)Multimedia (View All Report Types)
 
Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

IBM zSecure Compliance and Administration
sponsored by IBM
WEBCAST: View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information.
Posted: 11 Mar 2013 | Premiered: Mar 11, 2013

IBM

One Campus Card Solution That Solves Identity Issues
sponsored by HID
WEBCAST: This webinar takes a peek into the European education market, and presents a new kind of security identity solution that is paving the way of the future.
Posted: 07 Aug 2014 | Premiered: Aug 7, 2014

HID

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

The Promise of Content-Aware Identity and Access Management
sponsored by CA Technologies.
PODCAST: This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy.
Posted: 24 Nov 2010 | Premiered: Oct 13, 2010

CA Technologies.

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement