Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Protection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Hardware Multimedia (View All Report Types)
 
Multi-User GPU: Make IT More Dependable and Easier to Manage
sponsored by AMD
VIDEO: Discover a multi-user GPU that delivers workstation-class graphics from the data center, providing the freedom to run any application on virtually any device, anywhere on the network. Watch now to learn more about the world's first hardware virtualized GPU that provides superior performance, enhanced security, and scalability.
Posted: 19 Jul 2016 | Premiered: 19 Jul 2016

AMD

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
WEBCAST: Discover how Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Learn how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 05 Jul 2016 | Premiered: Feb 29, 2016

Dimension Data

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Video Introduction to a Scalable Modular Server
sponsored by NEC Corporation of America
VIDEO: Learn about an agile, highly scalable platform perfect for running Hadoop software with a low initial overhead in this webcast. Find out how you can save on space with small but powerful hardware designed with the needs of both established and growing businesses in mind.
Posted: 29 Sep 2016 | Premiered: 29 Sep 2016

NEC Corporation of America

What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012

Intel

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement