Asymmetric Cryptography Multimedia

(View All Report Types)
IT Priorities 2018 - What are UK IT managers spending their budgets on?
sponsored by TechTarget ComputerWeekly.com
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, talks us through the key areas that IT managers in the UK are planning on spending their budgets on. Results and statistics are taken from Computer Weekly's 2018 IT Priorities survey in which over 250 IT decision makers took part.
Posted: 08 Feb 2021 | Premiered: 02 May 2018

TechTarget ComputerWeekly.com

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST: This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009

Dell Software

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

Mission Critical Services
sponsored by Hewlett Packard Enterprise
WEBCAST: In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
Posted: 01 Dec 2008 | Premiered: Nov 26, 2008

Hewlett Packard Enterprise

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

VMware ACE 2
sponsored by VMware, Inc.
PRODUCT DEMO: Complex desktop environments have proven difficult for deployments, maintenance, and control. Download this free trial from VMware which combines the power and versatility of virtual machines with the security and control of centrally managed PCs
Posted: 31 Oct 2007 | Premiered: 31 Oct 2007

VMware, Inc.

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM