Business of Information Technology  >   Business Management  >  

Business Risk Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Business Risk AnalysisMultimedia (View All Report Types)
 
Mobile communications: How to make governance work
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to develop data management techniques that successfully align information governance best practices with your organization's mobile communications strategy.
Posted: 09 Jun 2014 | Premiered: 10 Jun 2014

SearchCompliance.com

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Advanced Persistent Threats: Detect, Engage and Remove
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores a unique, next-generation strategy for thwarting APTs – focusing their attention on the behavior examination.
Posted: 27 May 2014 | Premiered: May 27, 2014

Hexis Cyber Solutions Inc

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

AlienVault and the MSSP Program Overview
sponsored by AlienVault
WEBCAST: Watch this web cast to get an inside scoop on all that MSSP has to offer.
Posted: 17 Jun 2014 | Premiered: Jun 17, 2014

AlienVault

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks
sponsored by Proofpoint, Inc.
WEBCAST: For all healthcare providers, properly secured email and other web 2.0 tools help lower costs while improving service delivery. But failing to protect patient data or meet regulatory requirements could mean large fines and strict penalties. Watch this webcast to uncover the top 5 messaging and collaboration risks.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

Proofpoint, Inc.

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement