IT Management  >   Systems Operations  >  

Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Auditing Multimedia (View All Report Types)
 
Webinar: Getting Hadoop Through an IT Audit
sponsored by WANdisco
WEBCAST: Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
Posted: 08 May 2014 | Premiered: May 8, 2014

WANdisco

Centennial Discovery 2007
sponsored by FrontRange Solutions Inc
TRIAL SOFTWARE: Centennial Discovery is an award-winning IT Audit and Inventory management solution designed to improve IT governance by enabling customers to more effectively plan, manage and report on various IT operational disciplines
Posted: 01 Apr 2008 | Premiered: 01 Apr 2008

FrontRange Solutions Inc

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett-Packard Company
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

The Power and Payback of Unified IT Monitoring
sponsored by CA Technologies.
WEBCAST: Watch this exclusive webcast to learn how you can leverage a single IT monitoring platform to measure and report the metrics that matter most to your enterprise, and adopt and manage new customer-focused applications faster than you ever could before. Click on the link now to learn more.
Posted: 19 Jun 2014 | Premiered: Apr 29, 2014

CA Technologies.

Eli Lilly accelerates SAP process innovation with Winshuttle's Lean Data Management platform
sponsored by Winshuttle, LLC
VIDEO: How can you accelerate SAP innovation? Watch this in-depth webinar to hear from Six Sigma experts from Eli Lilly. Read on to learn how they use Six Sigma problem solving principles to accelerate SAP process innovation.
Posted: 10 Mar 2015 | Premiered: 10 Mar 2015

Winshuttle, LLC

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.

The Impacts and Implications of Big Data on the Data Centre
sponsored by Equinix
WEBCAST: Explore this whitepaper to learn about how best to confront the IT burdens associated with big data processing, and how you can turn your data center into a strategic asset and take full advantage of data growth.
Posted: 22 Apr 2014 | Premiered: Dec 31, 2013

Equinix

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Protecting your Organization’s Most Valuable Data
sponsored by IBM
WEBCAST: This webcast delves into how to find out the source of database information attacks. Watch now to explore multiple case studies of security breaches and how one data protection platform simplifies detecting and blocking rogue users.
Posted: 11 Mar 2015 | Premiered: Jan 15, 2015

IBM

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Increasing Scalability and Performance with Better Endpoint Management Solutions from IBM
sponsored by IBM
WEBCAST: This webcast provides insight on an endpoint management system solution that provides the right tools to efficiently monitor current endpoint operations and security.
Posted: 09 Sep 2013 | Premiered: Sep 9, 2013

IBM

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies

MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Purpose built solution addresses security and compliance concerns
sponsored by Alert Logic
WEBCAST: Access this webcast to learn how one cloud-based security strategy can protect your sensitive data against today's dynamic cyber-attacks. Watch now to learn more.
Posted: 17 Mar 2015 | Premiered: Jan 14, 2015

Alert Logic

More Accurate Security Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast explores how machine learning can move around false positives and find the real threats.
Posted: 25 Mar 2015 | Premiered: Mar 25, 2015

Prelert

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Detecting Web App Vulnerabilities Before Hackers Do
sponsored by IBM
SOFTWARE DOWNLOAD: View now to learn how a web application analysis tool detects your web app vulnerabilities and compiles them in an easy to read security report to help you remediate faster. View now to learn more.
Posted: 24 Feb 2015 | Premiered: 18 Feb 2015

IBM

The Landscape of Threat Intelligence
sponsored by SurfWatch Labs
WEBCAST: The webcast will help you determine if threat intelligence is the best solution for you by giving you an in-depth look today's intelligence landscape.
Posted: 27 Mar 2015 | Premiered: Feb 20, 2015

SurfWatch Labs

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

Detecting Mobile App Security Gaps
sponsored by IBM
PRODUCT DEMO: Access this resource today for your free download of IBM's Security AppScan Mobile Analyzer to detect any gaps in your app mobile app security.
Posted: 24 Feb 2015 | Premiered: 04 Feb 2015

IBM

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

Toshiba Storage: The Unexpected Audit
sponsored by Toshiba
VIDEO: This video takes a look at what happens when a business rolls the dice with their financial data (hint: it's not good).
Posted: 08 Apr 2015 | Premiered: 06 Feb 2014

Toshiba

Standardizing with Linux for Increased Datacenter Efficiency
sponsored by Red Hat
VIDEO: Watch this webinar and learn more about 5 major transformative areas that can make IT operations more efficient.
Posted: 04 Aug 2014 | Premiered: 04 Aug 2014

Red Hat

Robust Data Collection Functionality Combined with Finance Controls, Data Validation and Comprehensive Auditability
sponsored by Winshuttle, LLC
VIDEO: In this exclusive video, learn the benefits of SAP finance software which can improve and standardize your financial operations by using resources you already have with no new programming. Read on to learn about benefits like easy SAP downloads, streamlined business processes, faster closing times, and shorter billing cycles.
Posted: 04 Mar 2015 | Premiered: 04 Mar 2015

Winshuttle, LLC

How to Navigate Legacy Records, Compliance, and Big Data in Banking
sponsored by Hewlett-Packard Limited
VIDEO: This brief video zeroes in on legacy records and compliance in the digital age of banking. Tune in to learn how you can effectively archive and capture legacy records even as regulatory pressures grow.
Posted: 05 Nov 2014 | Premiered: 05 Nov 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement