IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Smartcards

RSS Feed    Add to Google    Add to My Yahoo!
Smartcards Multimedia (View All Report Types)
 
Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Everything as a Service: Improve Workflow in All Departments
sponsored by ServiceNow
VIDEO: In this brief video, learn how you can leverage Everything as a Service to enable automation and efficiency across your organization. Discover how to deliver everything from employee onboarding, to invoicing, to cloud provisioning as a service.
Posted: 23 Feb 2016 | Premiered: 29 Apr 2015

ServiceNow

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Sophos EndUser Protection Overview
sponsored by Sophos, Inc.
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos, Inc.

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement