Voice ID Multimedia

(View All Report Types)
SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

The power of AI and Automation: Productivity and agility
sponsored by IBM
VIDEO: Forward-thinking executives are harnessing data-driven innovation to improve performance, and in this Data Story IBM looks at research that shows how leading companies are using data as an asset and using intelligent automation to as a means to growth and operational advantage.
Posted: 02 Apr 2024 | Premiered: 01 Apr 2024

IBM

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013

Hewlett-Packard Enterprise

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Expect More From Your SIEM
sponsored by AT&T Cybersecurity
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel