IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Personal Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Personal Data PrivacyMultimedia (View All Report Types)
 
Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Self-Service Strategies That Put Service Relationship Management Into Hyperdrive
sponsored by Hewlett-Packard Company
WEBCAST: Take a look at this exclusive webcast to learn more about implementing effective self-service strategies.
Posted: 28 Aug 2014 | Premiered: Aug 28, 2014

Hewlett-Packard Company

Your Data has Left the Building; What are You Doing to Protect it?
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

RSA Security Analytics and RSA ECAT Customer Case Study: LA World Airports
sponsored by RSA, The Security Division of EMC
VIDEO: Bob Cheong, CISO of LA World Airports, discusses why RSA Security Analytics and RSA ECAT are key components of his state-of-the-art security operations center (SOC).
Posted: 27 Oct 2014 | Premiered: 27 Oct 2014

RSA, The Security Division of EMC

IT Service Brokerage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Avoid a Data Breach with Help from Data Access Governance
sponsored by RSA, The Security Division of EMC
VIDEO: Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

RSA, The Security Division of EMC

How HPA improved IT value and facilitated maximum growth
sponsored by Cisco & Fujitsu
VIDEO: Hutchison Ports Australia is developing new facilities at Brisbane and expects that when fully operational, these facilities will increase capacity by almost 100 per cent, providing importers, exporters and shipping lines with more choice and better service. View this video to see how Fujitsu is helping them achieve these goals.
Posted: 24 Oct 2014 | Premiered: 24 Oct 2014

Cisco & Fujitsu

Getting IT Security Right: Security Lessons Learned
sponsored by Icomm Technologies
VIDEO: This exclusive video looks at why organizations assume that because they haven't had a breach yet they are safe and why that assumption is wrong.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

Icomm Technologies

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement