IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures Multimedia (View All Report Types)
 
Webinar on demand: Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Real-Time Enterprise Analytics to Accelerate Quality Business Decisions
sponsored by Oracle Corporation
WEBCAST: In this webcast, you will learn about real-time data analytics, made possible by the Oracle SPARC M7 processor, which enables data analysis to take place directly on the operational database in real time. Catch this video now to remove all double-handling of your data.
Posted: 17 Nov 2015 | Premiered: Nov 11, 2015

Oracle Corporation

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: This webcast gives you solutions for business infrastructure virtualization that enable IT organizations to energize businesses of all sizes.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can ensure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

Keep Data Safe, No Matter Who Tries to Look at It
sponsored by OptioLabs
VIDEO: This video explores the challenge of keeping prying eyes away from your sensitive data. Take a look and learn how face-recognition software can keep your data safe anywhere your end users work.
Posted: 07 Jan 2016 | Premiered: 07 Jan 2016

OptioLabs

Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Case Study: How SunTrust Caught Up With Analytics
sponsored by SAS
WEBCAST: SunTrust's outdated tech had it falling behind competitors. Find out how it caught up with automation and optimization.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS

Interactive Tool: Business Analytics Maturity Assessment
sponsored by SAS
WEBCAST: Discover the strengths and weaknesses of your organization's analytics with this five minute test.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

TOPICS:  IT Management
SAS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement