IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   Identity Management  >  

Web Identities

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Entities that are registered, profiled, or authenticated as a unique registrant, whether by domain for a business or single sign-on for an individual.
Web IdentitiesMultimedia (View All Report Types)
151 - 175 of 356 Matches Previous Page  | Next Page
Information Governance Symposium 2013: Does Big Data=Big Headaches?
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this three-part web seminar taped at the ARMA International Conference, Consult IG owner Brent Gatewood explains how big data is changing information governance, and how businesses need to adapt records management processes to accommodate these changes.
Posted: 17 Dec 2013 | Premiered: 17 Dec 2013

SearchCompliance.com

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Information Governance Symposium: The Mobile Influence on Information Management Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: With the proliferation of BYOD, cloud, and social media within the enterprise, benefits like cost savings, along with improved customer relations and employee satisfaction often overshadow the cons. This classroom provides expert insights into the issues that those trends are throwing into information security and governance processes.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

Intel and Red Hat: Your Pathway to IT Modernization
sponsored by Red Hat and Intel
WEBCAST: This webcast details the importance of modernizing your IT systems.
Posted: 31 Dec 2013 | Premiered: Dec 31, 2013

Red Hat and Intel

Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

IT Can Be Done: How to Protect Enterprise Data Yet Enable Secure Access for End Users
sponsored by Code42
WEBCAST: Listen in to this webcast to learn how to protect enterprise data yet enable secure access for end users.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Code42

IT Security Challenges: Interview with Brian Glick and HP
sponsored by Hewlett-Packard Limited
WEBCAST: In this webcast, learn how to deal with security threats proactively and better understand the importance of becoming familiar with your IT's own vulnerabilities in infrastructure and applications so you're able to monitor and manage security optimally.
Posted: 07 Feb 2014 | Premiered: Feb 7, 2014

Hewlett-Packard Limited

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

Joffe & Kindervag Explain DDoS Mitigation
sponsored by Neustar®
WEBCAST: This crucial webcast takes an in-depth look at DDoS attacks, discussing how they became such a global threat and what your organization can do to mitigate them.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

KPN Focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: This brief video explores how one company learned from a past security breach and now is focusing more time and money towards system security.
Posted: 13 Feb 2014 | Premiered: Oct 3, 2013

Hewlett-Packard Limited

Increase your Citrix XenDesktop monitoring capabilities using HP Operations Management Software
sponsored by Citrix Ready and ComTrade
WEBCAST: Join us to learn how ComTrade's Smart Plug-in for Citrix (Citrix SPI) helps you measure, monitor and manage XenDesktop and gives you an end-to-end overview from within the HP Operations Manager and HP BSM.
Posted: 06 Sep 2012 | Premiered: Sep 26, 2012, 13:00 EDT (17:00 GMT)

Citrix Ready and ComTrade

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Integrated Data Management video
sponsored by IBM
WEBCAST: Integrated Data Management is the ability to manage enterprise application data and optimize data-driven applications, from requirements to retirement, across these heterogeneous environments.
Posted: 23 Mar 2010 | Premiered: Mar 23, 2010

IBM

Integrated Security - McAfee Software and Intel vPro Technology Video
sponsored by Intel
WEBCAST: This webcast explores how an integrated security approach can offer your organization complete coverage. Discover the benefits you can achieve with integrated security, including proactive threat response, simplified remote administration, energy efficiency, and more.
Posted: 28 Dec 2012 | Premiered: Dec 28, 2012

Intel

Intel Cloud Builders Reference Architecture: Enhanced Cloud Security with HyTrust & Vmware
sponsored by Intel
VIDEOCAST: While many businesses are eager to adopt cloud computing, building a secure cloud infrastructure deployment and operation is still a challenge. Watch this video to learn about a combination of security technologies that can ensure your cloud environment is protected.
Posted: 01 Mar 2012 | Premiered: Dec 20, 2011

Intel

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Intel® Chip Chat
sponsored by Intel
PODCAST: Intel® Chip Chat is a recurring podcast series of informal, one-on-one interviews with some of the brightest minds in the industry. It strives to bring listeners closer to the innovations and inspirations of the men and women shaping the future of computing, and in the process share a little bit about the technologists themselves.
Posted: 13 Dec 2011 | Premiered: Dec 13, 2011

Intel

Introducing BlackBerry Balance™ Technology
sponsored by BlackBerry
WEBCAST: Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.
Posted: 16 Sep 2011 | Premiered: Sep 16, 2011

BlackBerry

Is it possible to have too many tools?
sponsored by Nimsoft, Inc.
WEBCAST: Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

IT Connects Customers to Brands
sponsored by Cisco Systems, Inc.
VIDEO: Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.
Posted: 16 Aug 2010 | Premiered: 16 Aug 2010

Cisco Systems, Inc.

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

Keeping Service Desk Simple
sponsored by Nimsoft, Inc.
WEBCAST: Access this informative webcast to learn about an innovative service desk technology that was designed to simplify service desk processes and alleviate the common issues associated with legacy service desk systems.
Posted: 11 Jul 2012 | Premiered: Jul 1, 2012

Nimsoft, Inc.

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Limited
151 - 175 of 356 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement