Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Content Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security Hardware Multimedia (View All Report Types)
 
Microsoft Surface Hub: Enhancing Conference Room Collaboration
sponsored by TechData - Microsoft
VIDEO: Watch this brief video to find out how the teams over at Microsoft worked to reinvent collaborative conference room technology. Learn about a team-oriented computer designed to be accessible, intuitive, and interactive and transform the way people work together in creative environments.
Posted: 01 May 2017 | Premiered: 12 Dec 2016

TechData - Microsoft

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Improving Customer Experience Starts with the Employee Experience
sponsored by Dell EMC - Workstation
WEBCAST: Uncover the key findings of this Forrester study to find out how business leaders in Asia-Pacific and Japan (APJ) can leverage PC lifecycle management to improve workforce technology and deliver better customer experiences.
Posted: 14 Apr 2017 | Premiered: Apr 7, 2017

Dell EMC - Workstation

Why a Workstation?
sponsored by Dell EMC - Workstation
VIDEO: Is a workstation right for you? Take 2 minutes to watch this webcast to see if your organization requires workstations and how your employees will be able to utilize them. You will also learn about a service that customizes workstations to meet your unique business needs.
Posted: 05 Apr 2017 | Premiered: 05 Apr 2017

Dell EMC - Workstation

VA vs. Watts: Demystifying Sizing and Ratings
sponsored by Eaton
WEBCAST: In this brief on-demand webcast, you will examine the difference between VA and watts, and what this difference means in terms of data center power management. Tune in now to discover why this distinction is critical in helping you correctly size your UPS.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Workstation Advisor Tool
sponsored by DellEMC and Intel®
VIRTUAL ENVIRONMENT: This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
Posted: 10 Apr 2014 | Premiered: 10 Apr 2014

DellEMC and Intel®

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement