IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Privacy Multimedia (View All Report Types)
 
Secure, Scalable Content Collaboration
sponsored by IBM
VIDEO: This short video highlights how a CIO of a national leading bank improved critical steps of a loan application process to ensure sensitive customer information and documents are being handled in the best way. Gain ideas on how you can improve your content management processes to keep important information secure and help improve customer service.
Posted: 27 Jul 2016 | Premiered: 17 Mar 2016

IBM

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

IT Best Practices for Managing (or Inheriting!) Public Cloud Workloads
sponsored by Embotics
WEBCAST: Many workloads don't need to be running 24/7, but it's easy to forget to power them down which can give you a nasty surprise that is your monthly bill. Automation can help you reduce public cloud spending by 65% by scheduling on/off times for non-production instances. In this webcast, learn how other organizations are overcoming these pains.
Posted: 23 Aug 2016 | Premiered: May 18, 2016

Embotics

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Rx for Embedding Security into Vulnerable Healthcare Systems
sponsored by Certified Security Solutions (CSS)
WEBCAST: Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

AMD MxGPU Is the World's First Hardware Virtualized GPU
sponsored by AMD
VIDEO: Discover how you can bring the power and features of a physical GPU to VDI and learn how you can get powerful 3D rendering and secure, consistent performance across all your apps.
Posted: 26 Aug 2016 | Premiered: 26 Aug 2016

AMD

Customer Identity Use Cases: Building a Complete, Contextual Digital Experience
sponsored by Radiant Logic, Inc.
WEBCAST: See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.
Posted: 08 Aug 2016 | Premiered: Oct 8, 2015

Radiant Logic, Inc.

Sonora Quest Labs Runs Converged System for Better Flexibility and More Value
sponsored by NTT ICT
VIDEO: In this video case study, see how by implementing HPE's Converged System 240, Sonora Quest Labs was able to improve their VM flexibility and deliver greater value to their organization as a whole.
Posted: 08 Sep 2016 | Premiered: 12 Jan 2016

NTT ICT

Enabling Secure, Customized Identity Management
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to deliver smarter security and more customized services to your customers. Listen in to see how a common identity service for all constituents can improve security and deliver better services to your customers, while saving time and money in administration.
Posted: 08 Aug 2016 | Premiered: Sep 18, 2015

Radiant Logic, Inc.

GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement