IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Smartcards

RSS Feed    Add to Google    Add to My Yahoo!
Smartcards Multimedia (View All Report Types)
 
Remote Systems Monitoring for Power and Cooling
sponsored by Emerson Network Power
VIDEO: Discover in this video how to leverage data center remote monitoring to evaluate the health and status of your critical power and cooling equipment. Tune in to capture critical system performance data and turn it into actionable insights with alarm notifications, custom escalation plans, and proactive diagnostics.
Posted: 07 Jun 2016 | Premiered: 19 Jan 2011

Emerson Network Power

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Expert guidance for DCIM: Data Center Information Management Solutions
sponsored by Schneider Electric
PODCAST: How can you ensure that your DCIM implementation will be a success? Tune into this podcast to discover how you can avoid the common pitfalls of DCIM software implementation and ensure the success of your DCIM strategy, and learn how to leverage scalable, modular architecture with strong vendor support.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Transform Your Applications, Transform Your Business
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Additionally, discover a service that will transform inflexible apps and dated legacy infrastructure into a modern environment with which IT can create better business value.
Posted: 16 Sep 2016 | Premiered: 02 Aug 2016

Hewlett-Packard Enterprise

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Automated Test Data Creation: An IT Manager's Review
sponsored by CA Technologies
VIDEO: Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.
Posted: 09 Sep 2016 | Premiered: 29 Feb 2016

CA Technologies

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement