IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Signatures

RSS Feed    Add to Google    Add to My Yahoo!
Signatures Multimedia (View All Report Types)
 
Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

Moving from Simple Authentication to Identity Assurance
sponsored by RSA
VIDEO: Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.
Posted: 30 Jan 2017 | Premiered: 27 Jan 2017

RSA

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

Solving the DLP Puzzle: Tips for a Successful Deployment
sponsored by Intel Security
WEBCAST: Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is. Check out these tips and techniques to ease common DLP pain points, and explore migration use cases.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

Boost Your Hyper Converged Solution's Speed with Cloud
sponsored by Prosys- HPE
WEBCAST: Watch this 1 minute webcast to learn how hyper converged platforms enable IT generalists, rather than specialists, to manage your VMs regardless of your staff resources.
Posted: 23 Feb 2017 | Premiered: Feb 23, 2017

Prosys- HPE

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

Remain Competitive in Your Marketplace with Flexible Capacity
sponsored by Hewlett Packard Enterprise
VIDEO: Do you have a strategy for matching infrastructure cost with revenue? Tune in to achieve the benefits of on-premise IT with the economics of a public cloud, and learn to overcome the privacy, compliance, security, and localization concerns you may harbor about cloud.
Posted: 23 Jan 2017 | Premiered: 20 Nov 2015

Hewlett Packard Enterprise

Shape Your Best Cloud Strategy
sponsored by Splunk
WEBCAST: Think about these four key factors to influence your cloud decisions.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

State-of-the-art Technology Exceeds Customer Expectations
sponsored by NetApp
WEBCAST: Discover how NetApp All Flash FAS enables businesses to enrich the end-user experience and operate more competitively.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement