IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Wireless Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Secure Mobile Messaging, Secure Wireless Messaging, Mobile Messaging Security
DEFINITION: The protection of wireless messaging content.
Wireless Messaging Security Multimedia (View All Report Types)
101 - 125 of 453 Matches Previous Page  |  Next Page
Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Eli Lilly accelerates SAP process innovation with Winshuttle's Lean Data Management platform
sponsored by Winshuttle, LLC
VIDEO: How can you accelerate SAP innovation? Watch this in-depth webinar to hear from Six Sigma experts from Eli Lilly. Read on to learn how they use Six Sigma problem solving principles to accelerate SAP process innovation.
Posted: 10 Mar 2015 | Premiered: 10 Mar 2015

Winshuttle, LLC

Emerging Expectations of CIO's
sponsored by FrontRange Solutions Inc.
WEBCAST: Consult this on-demand webcast today to learn about the role and expectations of the modern CIO, and find out what skills and competencies are required to be successful in the position.
Posted: 03 Jul 2013 | Premiered: Mar 27, 2013

FrontRange Solutions Inc.

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

Enable an Enterprise-Ready Sync/Share Solution while Maintaining Data Security
sponsored by Code42
WEBCAST: For IT today, allowing users uninhabited access to files – while maintaining data integrity – becomes a difficult balancing act. Click through and join Code42 and IDC Senior Research Analyst Vanessa Thompson to learn how to more effectively and efficiently balance IT requirements and user needs, and more.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Code42

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

Enterprise Mobility University: Mobile Device Management and BYOD Classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom will provide a mobile landscape overview, along with strategies for staying afloat in this BYOD era.
Posted: 06 Sep 2013 | Premiered: 16 Aug 2013

SearchCIO.com

Envisioning and Enabling the Next Generation Enterprise
sponsored by Jive Software
WEBCAST: This webcast covers what it takes to envision and enable a next generation enterprise by considering much of the new technology that is flowing through the market. Learn how the CIO must change and adapt to meet new technology pressures and ultimately, give way to the next generation enterprise.
Posted: 17 Feb 2015 | Premiered: Feb 17, 2015

Jive Software

Experiences from the Field - Detailed Data Security Case Study
sponsored by IBM
VIDEO: Watch this exclusive video to hear from Product Marketing integration and governance specialist, Jeff Scheepers of IBM to learn more about the new emphasis being placed on database security in today's business landscape. Continue to watch hear about industry leaders' security issues and how they were able to resolve them.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Dynamic Virtual Clients
sponsored by Intel
VIDEO: In this video, Dave Buchholz and Clyde Hedrick explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.
Posted: 03 Dec 2009 | Premiered: 05 Nov 2009

Intel

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST: Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

EMC & Arrow

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner

Enabling the Journey to-IT-as-a-Service
sponsored by Citrix
WEBCAST: This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

End-to-End Mobile Device Management
sponsored by Zenprise
WEBCAST: Watch this brief video to learn how you can say yes to consumerization, letting your employees bring their beloved devices to the workplace, while also maintaining the vital security you need.
Posted: 08 Mar 2012 | Premiered: Mar 8, 2012

Zenprise

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Enhancing End-to-End Cloud Security: Part 3
sponsored by McAfee, Inc.
WEBCAST: This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
Posted: 13 Sep 2013 | Premiered: Sep 12, 2013

McAfee, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace
sponsored by VMware, Inc.
WEBCAST: This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

VMware, Inc.

Enterprise Security and your Technology
sponsored by Hewlett-Packard Company
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

ESG Study - Citrix and HP Help Deliver Alternative Desktop Solutions
sponsored by Citrix and HP
VIDEO: Watch this webcast to learn about a desktop virtualization combined solution that will enable you to move, manage, and secure virtual desktops and components from a central location.
Posted: 03 Jun 2014 | Premiered: 29 May 2014

Citrix and HP

Exchange 2007: In-house vs. Hosted - 5 Myths Debunked
sponsored by Intermedia
WEBCAST: In this Webinar, we explore the details of an Exchange 2007 migration and some of its most common ecosystem components, and how that deployment differs between an on-premise and a hosted solution.
Posted: 16 Dec 2008 | Premiered: Dec 16, 2008

Intermedia

Expect More From Your SIEM
sponsored by AlienVault
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault
101 - 125 of 453 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement