Software  >   Systems Software  >   Security Software  >  

Message Authentication Software

RSS Feed    Add to Google    Add to My Yahoo!
Message Authentication SoftwareMultimedia (View All Report Types)
 
CA ARCserve Backup r12.5 Security Features
sponsored by CA ARCserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

CA ARCserve

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE: Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Zixty Seconds: What is The Power of Everyone?
sponsored by ZixCorp
VIDEO: This brief video highlights the importance of finding a solution to email encryption that is easy to use without sacrificing security.
Posted: 27 Feb 2014 | Premiered: 27 Feb 2014

ZixCorp

Expert Integrated Systems: Can you put expertise in a box?
sponsored by IBM
PODCAST: Can you package expertise? More and more IT executives are adopting a new approach that makes it easier, faster and less expensive to deploy infrastructure and applications by integrating hardware, software and field-tested "patterns of expertise" in the form of expert integrated systems. Find out more.
Posted: 19 Mar 2013 | Premiered: Mar 18, 2013

IBM

Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

The Data Center Revolution: Making the Journey to IT as a Service with a Software-Defined Data Center
sponsored by VMware, Inc.
WEBCAST: This webcast covers how IT must transform the way it delivers services with IT-as-a-Service and how a software-defined data center is the foundation you need.
Posted: 04 Mar 2014 | Premiered: Mar 4, 2014

VMware, Inc.

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement