IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Electronic Signatures

RSS Feed   
ALSO CALLED: e-Sign, e-Signatures, Signatures, esign
DEFINITION: The electronic equivalent of a hand-written signature requiring user authentication, such as a digital certificate, smart card or biometric method for verification.
Electronic Signatures Multimedia (View All Report Types)
26 - 50 of 683 Matches Previous Page  |  Next Page
A Transformative Approach to Addressing Today’s Cybersecurity Threat Landscape
sponsored by Lumen
VIDEO: Given the severity of today’s cyberthreats and the penalties for regulatory noncompliance, business outcomes are heavily influenced (if not fully dictated) by an organization’s cybersecurity well-being. Watch this webinar to learn how to align cybersecurity with business objectives and address today’s threats.
Posted: 27 Oct 2020 | Premiered: 27 Oct 2020

Lumen

Addressing Enterprise Security Challenges
sponsored by Rackspace
VIDEO: In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Rackspace

Adopting Zero Trust Internet to Stop Phishing and Web-Based Attacks
sponsored by Menlo Security
VIDEO: In this webinar, discover the key issues addressed from the 2020 CyberEdge report relating to web and email security and dive into the practicalities of adopting Zero Trust Internet to improve web security.
Posted: 07 Oct 2020 | Premiered: 07 Oct 2020

Menlo Security

Akamai Kona Site Defender
sponsored by Akamai Technologies
VIDEO: Akamai's Kona Site Defender protects your applications and APIs against the most sophisticated DDoS and web application attacks. Harnessing the insights collected across the Akamai Intelligent Edge Platform, Kona Site Defender delivers highly accurate and predictive protection.
Posted: 03 Nov 2020 | Premiered: 03 Nov 2020

Akamai Technologies

Akamai Prolexic
sponsored by Akamai Technologies
VIDEO: Distributed denial-of-service (DDoS) attacks can vary in size and scope; each with the potential to knock your website offline and send business grinding to a halt. Fortunately, Akamai’s Prolexic pairs automated, proactive DDoS mitigation tools with unmatched visibility and skilled response teams. Watch Prolexic in action in this product demo.
Posted: 04 Nov 2020 | Premiered: 04 Nov 2020

Akamai Technologies

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Accelerate Database Applications
sponsored by NetApp
VIDEO: Discover how to maximize revenue generating transactions while reducing response times and total cost of ownership.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp

Accenture: Case Study: Bacardi's Hybrid System Architecture
sponsored by Microsoft
WEBCAST: Learn how high-performance analytics allowed Bacardi to improve reporting performance and reduce data load latency.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Leading Enterprises Are Reimagining ERP
sponsored by Microsoft
WEBCAST: Traditional ERP is no longer enough. Learn how to shift to New IT to boost agility and responsiveness.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: How Vodafone Transformed Its ERP and Its Business
sponsored by Microsoft
WEBCAST: Access this case study to hear Vodafone's GlobalHead of Business Intelligence discuss using HANA to unlock value.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: SAP HANA: Solution Overview
sponsored by Microsoft
WEBCAST: Discover how SAP HANA allows you to transform your business by conducting transactions and analysis in real time,
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: The Best Path to SAP S/4HANA Migration
sponsored by Microsoft
WEBCAST: Real-time responsiveness is now required. Learn why S/4HANA is the only answer, and how to migrate without interruption.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Accenture: Unlocking the Potential of SAP S/4HANA
sponsored by Microsoft
WEBCAST: In today's world, only high-velocity enterprises survive. Learn to drive digital advantage by leveraging SAP S/4HANA.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management
Microsoft

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013

IBM

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Al Powers Smarter Investment Decisions - Intel Chip Chat
sponsored by Intel and Google
PODCAST: Listen to this Intel Chip Chat podcast to learn how a natural language interface used on Intel® Xeon® Scalable processors available on Google Cloud Platform can help financial institutions make more informed decisions.
Posted: 05 Jun 2018 | Premiered: Jun 5, 2018

TOPICS:  IT Management
Intel and Google

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

All-Flash Storage Boosts Telecom's Performance Guarantees
sponsored by NetApp
VIDEO: Learn why matching the performance of compute, network and storage to the workload needs of enterprise customers is key.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

An Introduction to Intelligent Desktop Virtualization (IDV)
sponsored by Virtual Computer, Inc.
VIDEOCAST: Explore a desktop virtualization technology, Intelligent Desktop Virtualization (IDV), which can provide all the benefits of VDI with lower costs and complexity. Discover how IDV compares to VDI technology in this videocast.
Posted: 23 Feb 2012 | Premiered: Feb 23, 2012

Virtual Computer, Inc.

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST: This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Lumension
26 - 50 of 683 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info