media production

Results 26 - 29 of 29Sort Results By: Published Date | Title | Company Name
Published By: Brainshark     Published Date: Oct 16, 2013
Do you have a strategy specifically for video marketing? If not, you're missing out! Video has proven to be an effective means of boosting demand generation, enabling sales teams, improving PR practices, promoting upcoming events, and more. Read this E-book to get started now.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, demand generation, tracking video, event promotion
    
Brainshark
Published By: Sanbolic     Published Date: Aug 21, 2009
Today, most video post production for standard-definition content has moved onto disk-based, non-linear editing (NLE) systems. These systems offer improved flexibility over linear, tape-based systems by allowing a workstation fast access to any part of the digital media file.
Tags : 
hi def, hi-def, san, storage area network, storage area networks, cisco, storage, hi-def video
    
Sanbolic
Published By: Brainshark     Published Date: Oct 16, 2013
Why use video? This video explains. Find out how businesses are using video across the enterprise today.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Previous    1 2     Next   
Search Resource Library