IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Radio Frequency Identification

RSS Feed    Add to Google    Add to My Yahoo!
Radio Frequency Identification Multimedia (View All Report Types)
 
Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webcast, discover the six key steps you need to take to optimize your SIEM use.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Top Tips for Managing Your Application PaaS
sponsored by Oracle Corporation
WEBCAST: The private cloud cuts hard costs and delivers agility. But, getting there can be a problem. Developers demand flexibility and IT requires standardization. Platform as a Service is the solution. This webcast provides top tips for managing your application PaaS.
Posted: 13 May 2015 | Premiered: May 13, 2015

Oracle Corporation

Case Study: Local Government Finds the Perfect Security Intelligence Solution
sponsored by IBM
VIDEO: In this video, discover how a local government found a security intelligence tool that met their needs.
Posted: 22 Apr 2015 | Premiered: 14 Jan 2015

IBM

Risk I/O Explainer Video
sponsored by Risk IO
WEBCAST: Download this exclusive video now to learn about a vulnerability management solution that will reveal your system vulnerabilities, identify those most at risk, show you exactly what you need to fix, and much more.
Posted: 26 Jan 2015 | Premiered: Jan 15, 2014

Risk IO

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

Purpose built solution addresses security and compliance concerns
sponsored by Alert Logic
WEBCAST: Access this webcast to learn how one cloud-based security strategy can protect your sensitive data against today's dynamic cyber-attacks. Watch now to learn more.
Posted: 17 Mar 2015 | Premiered: Jan 14, 2015

Alert Logic

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Hybrid ITSM: Because having one option isn't an option
sponsored by FrontRange Solutions Inc.
VIRTUAL ENVIRONMENT: This interactive resource discusses how you can make your business more efficient, compliant, and secured with the help of a hybrid IT service management solution.
Posted: 28 Jun 2013 | Premiered: 28 Jun 2013

FrontRange Solutions Inc.

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement