IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Biometry

RSS Feed   
Biometry Multimedia (View All Report Types)
 
DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

JML
sponsored by SailPoint Technologies
VIDEO: In this short video, learn how you can easily manage roles at your organization with IdentityNow’s role-based identity management function.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

SailPoint Technologies

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason

How Cyberattackers Are Exploiting COVID-19 to Undermine Your Security
sponsored by Fidelis
PODCAST: Since widespread information about COVID-19 first surfaced back at the beginning of the year, there has been a reported uptick of phishing, ransomware and misinformation campaigns designed to prey on people’s fears. Listen to this webcast for insight into attacker objectives and tactics – including specific examples.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

Fidelis

Implementing a Hybrid Cloud Using Security & Compliance Automation
sponsored by Red Hat
WEBCAST: Maintaining visibility, control and security while ensuring governance and compliance is paramount. This becomes more difficult and arduous in a hybrid infrastructure consisting of physical, virtual, cloud and container environments. Watch this webinar to see how Red Hat can help you with these challenges by automating security and compliance.
Posted: 22 Jan 2021 | Premiered: May 14, 2020

Red Hat

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Keynote Tackling Security in the World of Containers and Hybrid Cloud
sponsored by Red Hat
WEBCAST: Placing security at the center of your organization’s processes, technology and culture is critical for addressing modern cyberthreats. This webinar features the Chief Security Architect, who offers best practices and strategic insight into successfully adopting a security culture – watch now to get started.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Red Hat

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Achieving security and compliance in Red Hat OpenShift Dedicated
sponsored by Red Hat
VIDEO: In this webinar from Red Hat’s online Security Symposium, join distinguished Red Hat expert Bill Montgomery as he offers a closer look at Red Hat’s OpenShift Dedicated (OSD), highlighting 8 key security and compliance features, the benefits of a hosted vs. self-managed models, and more – watch now to get started.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences