IT Agents  >   Information Technology End Users  >   User Groups  >  

Advanced Computing Systems Association

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Computing Systems AssociationMultimedia (View All Report Types)
 
ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Understanding Advanced Persistent Threats and Complex Malware
sponsored by Dell SecureWorks UK
WEBCAST: Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks UK

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It
sponsored by Lumension
WEBCAST: This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now.
Posted: 15 Feb 2013 | Premiered: Feb 15, 2013

Lumension

Royse Wells of International Paper shares his enthusiasm for the latest storage management advances
sponsored by IBM
WEBCAST: TSM has developed a groundbreaking new graphical tool which allows you to predict if and when a backup is going to fail. Watch this quick 1 minute video to learn more about this tool from users who know best.
Posted: 26 Nov 2013 | Premiered: Mar 5, 2013

IBM

Desktop Virtualization Solutions Overview: Features, Benefits
sponsored by Cisco Systems, Inc.
VIDEO: View this video overview to hear about the features and benefits of an advanced desktop virtualization platform built upon leading technologies that delivers agile, cost-effective and reliable desktop virtualization for your business.
Posted: 15 Jul 2013 | Premiered: 15 Jul 2013

Cisco Systems, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Back to the Future: How Linear Tape File System (LTFS) and Other Innovations Are Returning Tape to a Production Storage Role in the Data Center
sponsored by Iron Mountain
VIDEOCAST: Several recent tape advances have put this technology back on the IT radar, turning recent attention away from hard disks, flash SSDs, and cloud storage. This expert video examines the latest developments leading this comeback, including the availability of free file systems, new partitioned media offerings from a variety of vendors, and more.
Posted: 25 Jul 2013 | Premiered: Jul 17, 2013

Iron Mountain

Future of Mobility: Why the Network Matters
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This informative webpage explores how mobility will continue to grow and what that means for future networks looking to adapt.
Posted: 04 Apr 2014 | Premieres: 28 Apr 2014

Cisco Systems, Inc.

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Defining Today's Enterprise Class
sponsored by IBM
PODCAST: Access this exclusive podcast to discover how enterprise systems technologies are evolving to deliver availability, compliance, energy savings and improved user experience to organizations of all sizes.
Posted: 14 Mar 2013 | Premiered: Mar 14, 2013

IBM

Cost-cutting System Migrations with Near Zero Downtime
sponsored by Vision Solutions
VIDEO: This video presents an enterprise-level migration solution that provides near zero downtime, removes manual steps, and keeps costs low.
Posted: 07 Apr 2014 | Premiered: 07 Apr 2014

Vision Solutions

What Can Power/Linux Do That x86/Linux Can NOT - Top 5 reasons to run your workloads on Power with Linux
sponsored by IBM
WEBCAST: This informative webcast highlights the top 5 reasons for what makes Power a better choice for running Linux than x86. Not only does Power offer better reliability and resiliency, but it delivers virtualization at a low cost.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

IBM

Move Beyond Point Solutions to Complete EMM
sponsored by Citrix
WEBCAST: This informative webcast discusses the problems associated with point solutions and examines how and why your organization should move past these tools to a complete enterprise mobility management (EMM) solution.
Posted: 27 Feb 2014 | Premiered: Feb 27, 2014

Citrix

Enabling Consumer Smartphones and Tablets in the Enterprise
sponsored by Fiberlink
WEBCAST: In this webcast, join Gartner Research Vice President Phil Redman and Jim Sheward, CEO of Fiberlink, as they address the key components of an effective enterprise mobility strategy, the associated challenges, and how to keep up with the fast pace of change in mobility.
Posted: 21 Dec 2011 | Premiered: Dec 21, 2011

Fiberlink

From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST: Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

SearchConsumerization.com's Guide to Assessing Business and Technology Needs for MDM Solutions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In the first of SearchSecurity.com's three-part guide on selecting MDM products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of MDM solutions.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

The Impacts and Implications of Big Data on the Data Centre
sponsored by Equinix
WEBCAST: Explore this whitepaper to learn about how best to confront the IT burdens associated with big data processing, and how you can turn your data center into a strategic asset and take full advantage of data growth.
Posted: 22 Apr 2014 | Premiered: Dec 31, 2013

Equinix

MI University: Storage and Networking for Desktop Virtualization Classroom
sponsored by SearchVirtualDesktop.com
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

SearchVirtualDesktop.com

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

5 Approaches that will kill your mobility project
sponsored by Citrix
WEBCAST: This crucial webcast takes an in-depth look at five common enterprise mobility mistakes that may not seem that bad, but can end up killing your mobile initiatives.
Posted: 06 Jan 2014 | Premiered: Jan 6, 2014

Citrix

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

MDM Security Features: Keys to purchasing a solution
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this expert decision center from SearchSecurity.com to find about the advanced mobile security features offered by some of the top mobile device management vendors on the market. Discover and compare how thorough each solution's features really are.
Posted: 30 Jul 2013 | Premiered: 30 Jul 2013

SearchSecurity.com

Future Focus: What’s Coming in Enterprise Mobility Management
sponsored by BlackBerry
WEBCAST: This exclusive white paper discusses how enterprise mobility management (EMM) is changing and where the market is heading. Read on to learn what steps your organization can take to get the most from the future of mobility.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

BlackBerry

Virtualized Storage: Top Use Cases and Essential Attributes
sponsored by IBM
WEBCAST: View this short video to learn how a hospital in Stuttgart, Germany implemented a virtualized storage architecture into its existing infrastructure to increase capacity, performance and scalability without increasing costs.
Posted: 24 Oct 2013 | Premiered: Oct 24, 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement