IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >   Identity Management  >  

Web Identities

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Entities that are registered, profiled, or authenticated as a unique registrant, whether by domain for a business or single sign-on for an individual.
Web IdentitiesMultimedia (View All Report Types)
26 - 50 of 507 Matches Previous Page  | Next Page
Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Automated Removal of Advanced Threats: Defending Your Enterprise with Bob Gourley
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This report from CTOvision introduces automated threat removal, an economical defense method that enables businesses to have an "invisible workforce" working around the clock to ward off attackers.
Posted: 14 Jul 2014 | Premiered: Jun 16, 2014

Hexis Cyber Solutions Inc

Automating Your Microsoft World - Cloud Efficiencies
sponsored by N-able Technologies
WEBCAST: This informative video examines how you can leverage an automation manager to improve cloud efficiencies and streamline application performance and delivery.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Beating Back Malicious Mobile Apps Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

Best Practices for Enterprise Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Watch this webcast to get advice from a panel of cloud service provider CEOs and cloud experts. The panel provides the best practices for protecting enterprise data in the cloud.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:01 EDT (05:01 GMT)

Druva Software

Best Practices for Leveraging Security Threat Intelligence
sponsored by AlienVault
WEBCAST: This exclusive webcast explores how you can use threat intelligence to stop attacks before they ever happen.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

Brian Madden State of the Industry: Managing at the Windows Level
sponsored by AppSense
VIDEOCAST: In this video, expert Brian Madden discusses key desktop management trends, challenges and technologies, and reveals how to better manage your Windows users, accounts, and applications in virtual desktops. Find out how to securely and effectively deliver applications through virtual desktops to your predominantly mobile workforce.
Posted: 04 Dec 2014 | Premiered: Dec 4, 2014

AppSense

Application Security Viewpoint
sponsored by Ounce Labs, an IBM Company
PODCAST: Application security is the aspect of understanding how applications are built and how someone could gain an advantage by looking at the application’s flaws. In this podcast, dive into the nature of applications for details on their security and how we interact with them.
Posted: 03 Feb 2010 | Premiered: Feb 3, 2010

Ounce Labs, an IBM Company

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

AppSense DataNow
sponsored by AppSense
VIDEOCAST: Learn how your organization can provide instant access to work documents from mobile devices. This videocast presents a solution that extends your IT infrastructure out into the mobile world in minutes.
Posted: 19 Jun 2012 | Premiered: Jun 19, 2012

AppSense

Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
WEBCAST: Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Best Practices for Archiving Lotus Domino Environments
sponsored by Symantec Corporation
WEBCAST: This webcast will show you exactly how to manage the many issues that come with archiving Lotus Notes Domino, file servers, IM, and collaboration environments.
Posted: 07 Mar 2008 | Premiered: Mar 19, 2008, 14:00 EDT (18:00 GMT)

Symantec Corporation

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Brian Madden and BlackBerry's Alan Panezic discuss BlackBerry Mobile Fusion, Balance, and PlayBook 2.0
sponsored by BlackBerry
VIDEO: Watch this 10 minute video to hear Brian Madden, blogger, and Alan Panezic, VP of Enterprise Product Management from BlackBerry, discuss the new offerings BlackBerry is giving to make sure employers and employees are happy with their mobile device capabilities.
Posted: 24 Feb 2012 | Premiered: 24 Feb 2012

BlackBerry

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat
26 - 50 of 507 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement