IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice Synthesis

RSS Feed   
Voice Synthesis Multimedia (View All Report Types)
 
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

InSecurity Podcast: Ron Ross - Applying the NIST Framework to Home Networks
sponsored by BlackBerry
PODCAST: Today’s security protocols are evolving so rapidly that organizations are in need of a framework to guide them. Who better to discuss the future of remote work and IT security than with a NIST Fellow? Listen to this gripping podcast to hear Dr. Ron Ross discuss the blindingly fast transformation from on-prem to remote work and what it means.
Posted: 02 Oct 2020 | Premiered: Apr 21, 2020

BlackBerry

Threat Intelligence Driven Detect and Response Operations
sponsored by Bitdefender
WEBCAST: Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.
Posted: 23 Jul 2020 | Premiered: Nov 30, 2019

Bitdefender

SailPoint Identity Now: Certification Creation
sponsored by SailPoint Technologies
VIDEO: Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.
Posted: 28 Jul 2020 | Premiered: 28 Jul 2020

SailPoint Technologies

The importance of identity in securing your business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

How Fortinet Secures AWS Migrations
sponsored by Rackspace
VIDEO: In order to make the most of your organization’s AWS migration, it’s critical to make deliberate considerations when it comes to establishing security measures and assigning security responsibility. Watch this webinar to more and discover how Fortinet can help secure AWS migrations and integrations.
Posted: 09 Oct 2020 | Premiered: 09 Oct 2020

Rackspace

Securing Your Remote Workforce from Cyberattacks
sponsored by Cox Communications, Inc.
VIDEO: Now more than ever, remote workforces need to be protected in order to ensure organizations stay productive. But as cybercriminals increase the tempo and severity of their attacks, what can organizations do to better protect themselves? Watch this webinar for exclusive insight into protecting remote workers.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cox Communications, Inc.

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security

Carbon Black WM
sponsored by VMware International Unlimited Company
VIDEO: Research suggests that the 2020 pandemic has been the catalyst for some of cyberattacks on organizations in recent memory. In this video, join Bryan Glick (Computer Weekly) and Greg Foss (VMware Carbon Black) as they discuss the evolving challenges of cybersecurity, why they’re happing and what your organization should be doing about it.
Posted: 28 Oct 2020 | Premiered: 28 Oct 2020

VMware International Unlimited Company

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info