IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

e-Signatures

RSS Feed    Add to Google    Add to My Yahoo!
e-Signatures Multimedia (View All Report Types)
 
9 steps to build a better insider threat program
sponsored by Forcepoint
WEBCAST: While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.
Posted: 06 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

Customer Story: Why I Invest in Next-Gen Tech
sponsored by Rubrik
WEBCAST: Matt Day, IT Manager at Langs Building Supplies, discusses his approach to transforming the data center, covers the real world challenges he has faced and shares the lessons he has learned in deploying next-gen technologies.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rubrik

Improve Business Decisions with Predictive Analytics in the Cloud
sponsored by IBM
VIDEO: Access this video to learn how you can generate predictive intelligence in the cloud without putting more strain on your IT department. Learn about the integrated capabilities needed to build and deploy cloud-based predictive models to unlock flexible, real-time analytics and enhance decision-making.
Posted: 26 Jul 2016 | Premiered: 16 Jul 2015

IBM

Maximize Information to Achieve Results in the Cognitive Era
sponsored by IBM
WEBCAST: Learn how innovative cognitive-loyalty apps improve your retail operation and customer satisfaction.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
IBM

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

"Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs
sponsored by NTT ICT
VIDEO: If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.
Posted: 05 Aug 2016 | Premiered: 30 May 2016

NTT ICT

Accenture: Case Study: Bacardi's Hybrid System Architecture
sponsored by Microsoft
WEBCAST: Learn how high-performance analytics allowed Bacardi to improve reporting performance and reduce data load latency.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Gartner Magic Quadrant for BI and Analytics Platforms
sponsored by Microsoft
WEBCAST: Find out who Gartner says leads the field in BI and Analytics platforms as the need for agility and user autonomy grows.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement