IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures Multimedia (View All Report Types)
 
You've Been Breached: Now What Do You Do?
sponsored by Dell SecureWorks
PODCAST: This podcast features tips on how to remedy a security breach before it can do lasting harm on your organization.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

Dell SecureWorks

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and IntelĀ®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and IntelĀ®

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management
sponsored by Commvault
WEBCAST: This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

Commvault

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

vGPU Horizon 7: Video Demonstration
sponsored by NVIDIA/VMware
VIDEO: Now, even the most intense graphics apps can run on VDI. See a demonstration of vGPU capabilities in this video.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management

VMware Horizon with NVIDIA Grid vGPU vs. Its Competitors
sponsored by NVIDIA/VMware
VIDEO: NVIDIA Grid vGPU works faster without compromising quality. Watch a demo of the product in action.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement