IT Agents  >   Information Technology End Users  >   User Groups  >  

Advanced Computing Systems Association

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Computing Systems Association Multimedia (View All Report Types)
 
Network Evolution University: Cloud Networking - Designing the Private Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

The Six Key Inflection Points You Can't Ignore in IT Infrastructure and Operations
sponsored by NetEnrich
VIDEO: In this webcast, Raju Chekuri, CEO of NetEnrich, addresses the constantly shifting landscape of IT and several best practices that will help you excel at meeting your specific IT demands. Tune in now to discover and solve the 6 key challenges faced when optimizing your operations for the cloud.
Posted: 07 Dec 2015 | Premiered: 17 Aug 2015

NetEnrich

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Cloud-Powered Integrated Systems: Engineered for Innovation
sponsored by Oracle, in association with Intel
VIDEO: In this video, you will discover what differentiates Oracle Engineered Systems' portfolio from other integrated systems, learn how this infrastructure can help reduce your IT complexity and accelerate the pace of innovation to improve competitive edge. Tune in now to integrate every enterprise workload into one manageable system.
Posted: 01 Mar 2016 | Premiered: 22 Dec 2014

Oracle, in association with Intel

A Definitive Guide to Windows 10 Management
sponsored by VMware
WEBCAST: This webcast examines the impact W10 will have on enterprise mobility in the next 5 years. Access this video to redefine your mobility management strategy with W10, and reap the benefits of its cloud-based management capabilities.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

VMware

Demo: Oracle Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
VIDEO: This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.
Posted: 21 Mar 2016 | Premiered: 04 Aug 2015

Oracle, in association with Intel

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

What does mobility really mean?
sponsored by Citrix
VIDEO: Watch this video to learn the current perceived meaning of mobility and what it should mean. You'll also find a joint mobility solution that utilizes cloud storage and safety best practices to enable your employees to share data, collaborate, and much more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014

Citrix

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.

Zero-Day Attacks: Why you need a Deeper Level of Inspection
sponsored by Check Point Software Technologies Ltd.
VIDEO: Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.
Posted: 25 Mar 2016 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which security strategies are most effective at dealing with today's dangerous array of cyber-threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Security Analytics: Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Public or Private, Instances in the Cloud Need Protection
sponsored by Unisys
VIDEO: Explore capabilities that conceal your instances in both private and public cloud environments.
Posted: 18 May 2016 | Premiered: 18 May 2016

Unisys

End Point Lightboard
sponsored by Palo Alto Networks
VIDEO: In this video, you will see the battle security pros fight every day and what new tools are needed to stop hackers.
Posted: 11 Feb 2016 | Premiered: 31 Aug 2015

Palo Alto Networks

Lightboard WildFire vs Standalone Sandboxing
sponsored by Palo Alto Networks
VIDEO: This presentation shows you how to simplify your network traffic monitoring and get rid of your existing Sandbox appliance. Protect against zero-day threats by using both static and dynamic analysis techniques.
Posted: 12 Feb 2016 | Premiered: 17 Oct 2014

Palo Alto Networks

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Discover how an anomaly detection solution can not only notify an enterprise when there is a problem, but also narrow down the causes so a fix can be created quickly. Learn how this solution zeros-in on vital information and sifts through bulky data quickly to resolve, in real-time, issues that can cripple an enterprise's operations.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Take Control with Software Defined Networking
sponsored by Verizon
VIDEO: As technologies advance and become more heavily relied on, there is a need for increased bandwidth, performance and reliability. How do you keep up? Software-defined networking (SDN) is the answer to connection problems. Watch this video to learn about an SDN management solution that will grant you greater control over your network.
Posted: 06 May 2016 | Premiered: 07 Dec 2015

Verizon

Why Manufacturers are Using the Cloud to Deliver Infosec
sponsored by OpenDNS
WEBCAST: In this webcast, review how Chart Industries, a global manufacturer with 5,000 employees and 45 locations, faced malicious activities every day and struggled to firefight data breaches.
Posted: 08 Feb 2016 | Premiered: Nov 20, 2015

OpenDNS

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement