Software  >   Systems Software  >   Security Software  >  

Message Authentication Software

RSS Feed    Add to Google    Add to My Yahoo!
Message Authentication Software Multimedia (View All Report Types)
 
Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE: Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Five Deadly Sins of Analytical Product Development
sponsored by Birst
WEBCAST: Kevin Smith, the Vice President of Embedded Solutions at Birst, is here to fill you in on the basics for avoiding drawbacks that hinder the success of your analytical product. Watch, and learn to escape 5 pitfalls that jeopardize your product's outcome.
Posted: 25 Mar 2015 | Premiered: Feb 27, 2015

Birst

7 Steps to Leverage DevOps for Tangible Business Benefits
sponsored by CA Technologies.
VIDEO: Tune into the following video to uncover the 7 secrets to DevOps success and learn how leading organizations are leveraging their DevOps strategies to improve overall software quality, decrease time to market, and more.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement