IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Personal Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Personal Data Privacy Multimedia (View All Report Types)
 
Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP
sponsored by Hewlett-Packard Limited
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Why You Need an Audit Trail
sponsored by Varonis
VIDEO: This brief video introduces a way to obtain an audit trail that gives you all the benefits of auditing without any of the drawbacks.
Posted: 25 Jun 2015 | Premiered: 25 Jun 2015

Varonis

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

An Inside Look into CA Workload Automation
sponsored by CA Technologies.
VIDEO: This video and accompanying demonstration offer an inside look into a workload automation tool that allows you to manage business processes from a single point of control.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

CA Technologies.

Ensuring Data Security in the Cloud and on Endpoints
sponsored by WinMagic
WEBCAST: This webcast explores the risks of cloud file sync and share services and how to ensure data protection in the cloud.
Posted: 01 Jul 2015 | Premiered: Jun 3, 2015

WinMagic

The CIO Agenda for 2015
sponsored by Gartner
WEBCAST: View this exclusive Gartner Symposium presentation to learn what should be on the agenda for CIOs in 2015.
Posted: 05 Jun 2015 | Premiered: Jun 5, 2015

Gartner

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement