Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed    Add to Google    Add to My Yahoo!
Tokens Multimedia (View All Report Types)
 
ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

SearchSecurity.com University: Network Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Posted: 07 Aug 2013 | Premiered: 07 Aug 2013

SearchSecurity.com

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

BP Turns to Fujitsu for Technology Upgrade
sponsored by Cisco & Fujitsu
VIDEO: Find which vendor BP selected to ensure a seamless transition to their new operating system.
Posted: 20 Oct 2014 | Premiered: 11 Feb 2014

Cisco & Fujitsu

Power vs x86 Solitaire video
sponsored by IBM
VIDEO: This webcast compares X86 servers with the newer IBM Power system and notes the major differences. IBM Power servers lower costs by as much as 75%. You can redirect resources without needing additional servers. Power comes with an integrated security solution
Posted: 31 Oct 2014 | Premiered: 06 Jun 2013

IBM

IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014

IBM

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Introducing Dell 12th Generation PowerEdge Servers
sponsored by Dell, Inc. and Intel®
VIDEO: This short video examines the importance of remote server management, especially as organizations expand globally. Discover new design features that enable you to quickly detect issues, regardless of the physical location of your data center.
Posted: 26 Jul 2012 | Premiered: 05 Mar 2012

Dell, Inc. and Intel®

The CIO Perspective on Intel vPro Technology
sponsored by Intel
VIDEO: Gerry Weaver, CIO of the State of Indiana, and Diane Bryant, CIO of Intel, talk about how Intel vPro technology helps address end-user and IT efficiencies in their environments. The CIOs discuss real ROI numbers from Intel vPro technology, including savings of $1 million or more.
Posted: 29 Apr 2010 | Premiered: 11 Jan 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement