Hardware  >   Security Hardware  >  

Security Devices

RSS Feed    Add to Google    Add to My Yahoo!
Security Devices Multimedia (View All Report Types)
 
The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
WEBCAST: Discover how Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Learn how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 05 Jul 2016 | Premiered: Feb 29, 2016

Dimension Data

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

PlateSpin Forge: "Plug in and Protect" Disaster Recovery
sponsored by Novell, Inc.
WEBCAST: PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Posted: 01 Sep 2009 | Premiered: Sep 1, 2009

Novell, Inc.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Methodist Health System’s Success with e-Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, explore how Methodist Health System of Omaha, Nebraska, leverages fingerprint biometric authentication to enable EPCS.
Posted: 08 Jun 2015 | Premiered: Jun 3, 2015

Imprivata

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

Take Back Control: OEM Maintenance and Life Cycle Myths Exposed
sponsored by Curvature
VIDEO: Watch this video to learn about upgrade myths and how your organization can take advantage of support and equipment alternatives.
Posted: 28 Apr 2015 | Premiered: 04 Dec 2014

Curvature
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement