IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Biometrics

RSS Feed   
Voice Biometrics Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
sponsored by Arctic Wolf
WEBCAST: This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).
Posted: 11 Sep 2018 | Premiered: Sep 11, 2018

Arctic Wolf

Hydro One Modernizes IT Infrastructure to Meet Market Demands
sponsored by Capgemini
VIDEO: Tune into this video case study to learn how Hydro One, a Canadian utilities provider, transformed their IT infrastructure using software-defined data center technology to meet market demands head on. Plus, learn how they used their SDDC deployment to achieve greater systems visibility, lower operating costs, and more.
Posted: 16 Dec 2019 | Premiered: 16 Dec 2019

Capgemini

Your App Security Stack: How to Defend Against the Evolving Threat
sponsored by Arxan
WEBCAST: In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST: Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)

ISACA

Dynamic Case Management: A Foundation for Agile Enterprise Business Applications
sponsored by Pegasystems
VIDEO: The dynamic case management approach is helping companies achieve significant, competitive results.  In this webinar, learn how your company can also achieve better service outcomes with dynamic case management.
Posted: 05 May 2011 | Premiered: 02 May 2011

Pegasystems

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

Get Cost Visibility and Chargeback for Your Cloud Services
sponsored by Hewlett Packard Enterprise
VIRTUAL ENVIRONMENT: This in-depth webcast, presented by Daniel Galecki, a software veteran and IT asset management guru, covers the IT transformation from a cost center to an IT service broker, and explains why analysts agree that chargeback is critical to the success of your cloud projects.
Posted: 17 Jun 2014 | Premiered: 10 Jun 2014

Hewlett Packard Enterprise

Selecting the Right Class Server UPS
sponsored by Eaton
WEBCAST: This brief video offers key insight to help you select the server-class uninterruptible power supply (UPS) that meets your short- and long-term business needs.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info