IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Electronic Signatures

RSS Feed   
ALSO CALLED: e-Sign, e-Signatures, Signatures, esign
DEFINITION: The electronic equivalent of a hand-written signature requiring user authentication, such as a digital certificate, smart card or biometric method for verification.
Electronic Signatures Multimedia (View All Report Types)
1 - 25 of 660 Matches Previous Page  |  Next Page
11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

5 Reasons to Make Virtual Agent Adoption a Priority
sponsored by Serviceaide
WEBCAST: Watch this brief video to explore the top 5 reasons for making virtual agent adoption a priority in your organization today.
Posted: 10 Jun 2020 | Premiered: Jun 10, 2020

Serviceaide

5-min demo: Data Security
sponsored by Veeam Software
VIDEO: With modernized data protection, organizations can cut their average ransomware recovery cost down or not pay anything at all. How? Tune into this demo to learn how you can protect your data with immutability from Veeam.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Veeam Software

A CARTA- Based, Zero Trust Approach to Workload Security
sponsored by Rezilion
WEBCAST: In this webcast, learn how adopting a Continuous Adaptive Risk and Trust Assessment, or CARTA approach, provides a zero-trust foundation for security and risk management leaders to gain more insight for contextual-based decision-making.
Posted: 26 May 2020 | Premiered: May 26, 2020

Rezilion

A Deeper Look Into the Threat of Botnets
sponsored by Cisco Umbrella
VIDEO: Tune into this Cisco Umbrella webinar to learn about how recent botnets infect, proliferate and distribute malware, and how you can keep your users safe from malware distributed by botnets.
Posted: 29 Jun 2020 | Premiered: 29 Jun 2020

Cisco Umbrella

A Security Architecture for the Cloud-Centric, Digital Enterprise
sponsored by McAfee
WEBCAST: View this webinar with experts Daryush Ashjari and Tim Stead, to find out where your responsibility lies, what cloud-native threats look like, and what it takes to build a cloud-centric security architecture.
Posted: 16 Oct 2020 | Premiered: Oct 15, 2020

McAfee

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Enterprise
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Enterprise

2014 Cost of Cyber Crime Study
sponsored by Hewlett-Packard Enterprise
WEBCAST: Cyber crime is growing more common and more costly. Read this survey to see the numbers on exactly what you're facing.
Posted: 13 Mar 2015 | Premiered: Mar 13, 2015

TOPICS:  IT Management
Hewlett-Packard Enterprise

2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST: This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

Lumension

3 Reasons Why Traditional Hyperconvergence Is a Risky Choice
sponsored by Riverbed Technology, Inc.
WEBCAST: Hyperconvergence is a hot trend, but many solutions don't measure up. Learn how the best solutions keep data safer.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

3 Tips for Planning Data Center Transformation
sponsored by HP Inc
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011

HP Inc

5 Key Considerations for a Successful VDI Deployment
sponsored by Riverbed Technology, Inc.
WEBCAST: VDI's benefits are clear, but some companies jump in too fast. Learn the most common pitfalls on the journey to VDI.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

5 Reasons IBM May Solve Your Data Storage Challenges
sponsored by IBM
WEBCAST: Frost & Sullivan explains the five ways your enterprise can benefit from IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

5 Traits of an Intelligence-Driven Security Operation Center
sponsored by Intel Security
WEBCAST: Understand the key challenges of traditional SOCs and find out what security leaders must do to build or mature an SOC.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AT&T Cybersecurity

7 Ways SteelFusion and Branch IT Resemble Your Smartphone
sponsored by Riverbed Technology, Inc.
WEBCAST: What do smartphones and HCI have in common? Find out how to rethink IT and keep it as simple and seamless as your phone.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

A Complete Paradigm Shift in Enterprise Storage
sponsored by IBM
WEBCAST: It's time to get more value from your data storage solution. Answer these questions for a comparative cost of ownership.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

A free Demonstration of Panda Cloud Systems Management
sponsored by Panda Security
SOFTWARE DEMO: Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

Panda Security

A Leap Forward In Digital Education
sponsored by NetApp
WEBCAST: Learn how Western Oregon University supports 10 times the number of concurrent users in 95% less processing time.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016

TOPICS:  IT Management
NetApp

A Massively Scalable Approach to Network Security
sponsored by Dell EMC
WEBCAST: This tech brief offers a better approach: an innovative scale-out next-generation firewall architecture that can address today's needs by providing: Better performance Increased resiliency Lower total cost of ownership (TCO)
Posted: 01 Dec 2015 | Premiered: Dec 1, 2015

TOPICS:  IT Management
Dell EMC

A Perspective on U.S. Health Industry Changes
sponsored by IBM
VIDEO: Director of Health Industry Transformation at IBM gives his perspective on the changes impacting U.S. Healthcare.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

A Solutions Approach to Web-Scale Storage
sponsored by IBM
WEBCAST: IDC predicts companies will face up to 80% annual growth in unstructured data. Avoid costly storage services with IBM.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
1 - 25 of 660 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info