IT Agents  >   Information Technology End Users  >   User Groups  >  

Advanced Computing Systems Association

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Computing Systems Association Multimedia (View All Report Types)
IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Webcast: How Innovations in IT are Revolutionizing Physical Security
sponsored by Pivot3
WEBCAST: This webcast discusses these leading-edge IT technologies with regards to the unique needs of video surveillance and physical security
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Radiant Logic, Inc.

Webcast: Global Hyper-Convergence 101: An Industry-Leading Advantage
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineering Team Lead at Pivot3, highlights one hyper-converged infrastructure (HCI) software solution that will ensure fault tolerance without replicating data. Access this video now to get an insider look at how to differentiate HCI provider offerings based on industry.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

How PSOs Harness Talent and Grow Margins
sponsored by Workday
WEBCAST: In this webcast, learn about professional services market trends, and the benefits of one professional services automation option, including improved resource management, increased service delivery quality, and more.
Posted: 20 Oct 2015 | Premiered: Sep 14, 2015


Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Protect Your Data: Meet the Heroes of a Dynamic Threat Protection System
sponsored by IBM
VIDEO: Organizations take an average of 225 days to detect an advanced persistent threat. Since you can't afford to wait that long, tune into this video and discover a methodology for preventing, detecting and responding to advanced attacks.
Posted: 04 Nov 2015 | Premiered: 09 Feb 2015


How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014


Data Protection Today
sponsored by
VIRTUAL ENVIRONMENT: As data protection evolves, organizations are finding new ways to supplement and improve their backups. This classroom looks at archiving and file synchronization, creating a solid data protection strategy and how and why backup software is converging with DR.
Posted: 26 Mar 2015 | Premiered: 17 Mar 2015

Storage Assessment Tool: How Much Inactive Data is Too Much?
sponsored by FujiFilm Dternity
SOFTWARE DOWNLOAD: This IT download provides you with a tool that can assess your stored files and give you a comprehensive analysis of the makeup of your file environment. Click now so that you can reduce your storage management time as well as costs associated with file storage.
Posted: 15 Oct 2015 | Premiered: 15 Oct 2015

FujiFilm Dternity

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

A New Way to Think about Security
sponsored by IBM
VIDEO: This brief video describes why managed security services (MSS) may be the answer to the increasingly complex question of modern security.
Posted: 14 Sep 2015 | Premiered: 07 Apr 2015


Understanding Cloud-Specific Security Technologies
sponsored by
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

Why Your Cybersecurity Needs to Advance
sponsored by BitDefender
VIDEO: This brief video discusses the dangers of traditional security and the importance of embracing sophisticated security measures. Take a look to learn how improving your security architecture can stop the rise of cybercrime.
Posted: 29 Oct 2015 | Premiered: 13 Oct 2015


Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

How to Power Your Enterprise Network and Transform Your Data Center
sponsored by Cisco Systems, Inc and Citrix
WEBCAST: This webcast explains how to automate network provisioning and control based on application requirements and policies, both for datacenter and enterprise environments. View now to learn how to transform your enterprise network with accelerated application deployment.
Posted: 06 Nov 2015 | Premiered: Aug 31, 2014

Cisco Systems, Inc and Citrix

Rethinking the Paradigm of Advanced Threats
sponsored by
VIRTUAL ENVIRONMENT: Access this virtual environment for invaluable resources on stopping today's most powerful cyber-threats.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015

InfoSec Monitoring & Analytics in the Age of IoT and Digital Transformation
sponsored by Symantec Corporation
WEBCAST: In this webcast, an experienced security professional discusses how you can integrate monitoring and analytics into your security strategy to better defend against advanced threats.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

The Benefits of a Virtual Security Operations Center
sponsored by IBM
VIDEO: In this video, you'll discover how a virtual security operations center can provide you with all the tools you need to fight today's advanced threats.
Posted: 21 Sep 2015 | Premiered: 12 Apr 2013


Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014


Medical Device Cybersafety - Separating Hype from Substance
sponsored by Symantec & Intuitive
WEBCAST: In this webcast, distinguished healthcare architect Axel Wirth reviews the difference between healthcare data compliance vs. security and the risks medical devices introduce to healthcare organizations. View now to learn medical device security priorities and best practices in order to avoid compliance failure and data loss.
Posted: 10 Nov 2015 | Premiered: Oct 20, 2015

Symantec & Intuitive

Protection Against the Three Vectors of a Healthcare Cyberattack
sponsored by Fortinet, Inc.
WEBCAST: In this webinar, examine the top security threats and vulnerabilities facing healthcare today as well as strategies to overcome these challenges.
Posted: 12 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement