Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed    Add to Google    Add to My Yahoo!
Tokens Multimedia (View All Report Types)
 
VPN Authentication by BlackBerry
sponsored by BlackBerry
WEBCAST: This webcast introduces VPN Authentication by BlackBerry, which simplifies users' access to the organization's VPN without compromising security.
Posted: 22 Jan 2015 | Premiered: Nov 28, 2014

BlackBerry

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Thrive, Survive or Perish - How the New Style of IT Changes the Rules of Business: Leading in the Compute Era
sponsored by Hewlett-Packard Company
VIDEO: View this webcast to learn about a server solution to redefine compute economics. Explore how to overcome increasing demands from mobility, cloud, social, and big data channels during your next server refresh.
Posted: 05 Dec 2014 | Premiered: 04 Nov 2014

Hewlett-Packard Company

Harnessing the Power of Citrix HDX Technology
sponsored by Citrix Ready and 10ZiG
VIDEO: This brief video explores the HDX components and hardware specifications which make a Citrix dual core zero client solution the most powerful and best performing Citrix Zero Client on the market.
Posted: 02 Dec 2014 | Premiered: 16 Sep 2014

Citrix Ready and 10ZiG

VA vs. Watts; Demystifying Sizing and Ratings
sponsored by Eaton Corporation
WEBCAST: This brief on-demand webcast describes the difference between volt-amperes (VA) and watts, and explains how differentiating between the two is critical in helping you correctly size your UPS.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton Corporation

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012

Intel

Workstation Advisor Tool
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
Posted: 10 Apr 2014 | Premiered: 10 Apr 2014

Dell, Inc.

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Deep Security 7.5
sponsored by Trend Micro, Inc.
VIDEO: Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
Posted: 15 Sep 2010 | Premiered: 15 Sep 2010

Trend Micro, Inc.

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

Sybase IQ 15: Addressing the Need for Speed
sponsored by Sybase, an SAP company
WEBCAST: Bill Jacobs, Director of Technical Marketing, Sybase IQ, discusses the speed and performance capabilities of Sybase IQ 15. These enhancements are designed to help make IQ 15 remain the smartest choice for analytic, reporting, business intelligence, data mining, and related applications.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Maintaining Control & Compliance in the Cloud with Data-Centric Security
sponsored by SafeNet, Inc.
WEBCAST: With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases.
Posted: 03 Jun 2010 | Premiered: Mar 3, 2010

SafeNet, Inc.

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

GFI MailArchiver 5 for Exchange
sponsored by GFI Software
TRIAL SOFTWARE: GFI is a leading supplier of security and messaging tools for network administrators. GFI empowers the network administrator to purchase security and messaging solutions with superior technology at unbeatable prices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

TOPICS:  Email Archiving
GFI Software

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014

Clearswift

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Sybase IQ 15: Making the Economical Choice
sponsored by Sybase, an SAP company
WEBCAST: Bill Jacobs, Director of Technical Marketing, Sybase IQ, discusses the elements and attributes of Sybase IQ that make it a very economical choice for your business intelligence, analytics, and data warehousing activity. The features in the latest release are highlighted, along with the base characteristics of Sybase IQ.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Sybase IQ 15: More Flexibility to Adapt and Grow
sponsored by Sybase, an SAP company
WEBCAST: Please join Bill Jacobs, Director of Technical Marketing, Sybase IQ, in this webcast about the first of seven topic areas – as he discusses the new features added to Sybase IQ 15 that enhance the flexibility of Sybase IQ 15 for analytics, reporting and business intelligence applications.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Quest Recovery Manager for Active Directory - Tips and Tricks
sponsored by Dell Software
WEBCAST: Are you using Quest Recovery Manager for Active Directory to its full potential? We have a Webcast that will show you some of the great things that Recovery Manager has to offer.
Posted: 06 Nov 2006 | Premiered: Nov 3, 2006

Dell Software

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement