IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Processing

RSS Feed   
Voice Processing Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

NWN Security
sponsored by NWN Corporation
VIDEO: For NWN, security is about risk, control and measurement – they took these pillars into consideration when crafting their security offering. Watch this short video for an overview of NWN’s cybersecurity vision and capabilities.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

NWN Corporation

SODD2
sponsored by SailPoint Technologies
VIDEO: Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.
Posted: 22 Jul 2020 | Premiered: 22 Jul 2020

SailPoint Technologies

Search2
sponsored by SailPoint Technologies
VIDEO: The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

How to Architect a Secure Remote Access Solution Without Sacrificing Performance
sponsored by ThousandEyes
WEBCAST: The COVID-19 pandemic brought on a seismic shift in the way enterprises work and where employees connect from — prompting enterprise IT to quickly scale and update VPN access to cope with increased usage. In this webinar, learn how ThousandEyes remote workforce solution enables IT teams to architect a solution without compromising on performance.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021


Preparing to Implement and Maintain a Zero Trust Security Strategy - Webcast and Demonstration
sponsored by Ionic Security
WEBCAST: The implementation and maintenance of a Zero Trust strategy requires meticulous preparation in order to ensure that users, devices, applications and networks are all protected. Watch this webinar and demo, which follows the story of an organization who sought to focus their Zero Trust efforts on protecting employee PII.
Posted: 07 Oct 2020 | Premiered: Oct 7, 2020

Ionic Security

A Mandate to Execute a New Data Security Strategy
sponsored by Ionic Security
VIDEO: In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.
Posted: 27 Feb 2020 | Premiered: 27 Feb 2020

Ionic Security

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences