IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical InfrastructuresMultimedia (View All Report Types)
 
Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Secure, sync and share content on your mobile device - BYOD
sponsored by Acronis
VIDEO: This video explains some of the challenges of the BYOD trend and highlights a solution that allows organizations to deliver optimal access, sync and share capabilities without sacrificing security.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Acronis

NEC Biometrics Solutions: Enhancing the Customer Experience and Securing Endpoints
sponsored by NEC Corporation of America
WEBCAST: This webcast reveals a biometrics solution that will help identify fraud across various industries.
Posted: 02 Oct 2014 | Premiered: Oct 1, 2014

NEC Corporation of America

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

New Strategies for Protecting Enterprise Networks and Endpoints
sponsored by CDW Corporation
WEBCAST: This webcast presents a next-generation firewall solution to protect your organization's network and endpoints.
Posted: 21 Jul 2014 | Premiered: May 31, 2014

CDW Corporation

NEC Biometrics Solutions Podcast: Enhancing the customer experience and securing endpoints
sponsored by NEC Corporation of America
PODCAST: This podcast reveals a biometrics solution that will help identify fraud across various industries. NEC's NeoFace uses a highly accurate, fast and flexible facial recognition tool for authentication purposes.
Posted: 10 Oct 2014 | Premiered: Oct 2, 2014

NEC Corporation of America

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

IT Service Brokerage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Self-Service Strategies That Put Service Relationship Management Into Hyperdrive
sponsored by Hewlett-Packard Company
WEBCAST: Take a look at this exclusive webcast to learn more about implementing effective self-service strategies.
Posted: 28 Aug 2014 | Premiered: Aug 28, 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement