Software  >   Systems Software  >   Security Software  >  

Message Authentication Software

RSS Feed    Add to Google    Add to My Yahoo!
Message Authentication SoftwareMultimedia (View All Report Types)
 
TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE: Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Evaluation of Enterprise Backup and Recovery Software and Vendors
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Access this exclusive resource for a complete list of findings of an enterprise backup and recovery software and vendor evaluation conducted by Forrester Research, Inc.
Posted: 20 Mar 2014 | Premiered: 28 Jun 2013

CommVault Systems, Inc.

Product Preview: Business Driven Insights
sponsored by Workday
WEBCAST: Watch this brief webcast now for a demo of data visibility financial software, and uncover its key features.
Posted: 24 Apr 2014 | Premiered: Dec 2, 2013

Workday

Symantec Endpoint Protection Small Business Edition 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement