IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice ID

RSS Feed   
Voice ID Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

The New Wave of Cyber Attacks – Ransomware, Extortion, and DDoS Threats
sponsored by AT&T Cybersecurity
VIDEO: The next generation of cyberattacks are expected to have devastating consequences that go beyond the scope of today’s cybersecurity capabilities. This webinar provides a comprehensive overview of these new threats, how they operation and what your organization can do to prepare.
Posted: 05 Nov 2020 | Premiered: 15 Oct 2020

AT&T Cybersecurity

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Helping Educators Defend their Web Applications with Amazon & Fortinet
sponsored by Fortinet, Inc.
VIDEO: Today’s distributed organizations operate outside what would be traditionally considered a perimeter. As a result, web application and API security are increasingly becoming the first line of defense for critical business asset. Watch this webinar to unlock exclusive insight regarding web app and API security from leaders at AWS and Fortinet.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

NWN SecureX Online Workshop
sponsored by NWN Corporation
VIDEO: Today’s cybersecurity paradigm has completely changed – security programs are now in the spotlight of the board of directors and security teams are faced with mounting pressure on numerous fronts. Watch this webinar to learn more about today’s challenges and how NWN is helping organizations address them.
Posted: 24 Nov 2020 | Premiered: 24 Nov 2020

NWN Corporation

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Why IT Directory Issues Should No Longer Be Viewed as the Cost Of Doing Business
sponsored by Okta
VIDEO: Identities are at the foundation of how an organization monitors and protects access to critical data – as a result, finding ways to secure and manage these identities becomes critical. In this short video, discover how IT directories can be used to support these initiatives – watch now to get started.
Posted: 04 Feb 2021 | Premiered: 04 Feb 2021

Okta

Threats - Abracadabra of Malwares: Obfuscation
sponsored by Cisco Umbrella
WEBCAST: In this episode of ‘A Cybersecurity Technical Mini Series’, take an in-depth look at obfuscation malware techniques; how they work, types of attacks, and how to mitigate these threats. Watch now to learn more.
Posted: 12 Feb 2020 | Premiered: Nov 30, 2019

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info