IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  


RSS Feed    Add to Google    Add to My Yahoo!
CERT Multimedia (View All Report Types)
IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Webcast: How Innovations in IT are Revolutionizing Physical Security
sponsored by Pivot3
WEBCAST: This webcast discusses these leading-edge IT technologies with regards to the unique needs of video surveillance and physical security
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Webcast: Global Hyper-Convergence 101: An Industry-Leading Advantage
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineering Team Lead at Pivot3, highlights one hyper-converged infrastructure (HCI) software solution that will ensure fault tolerance without replicating data. Access this video now to get an insider look at how to differentiate HCI provider offerings based on industry.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011


Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010


Discovering the New Business Case for Cybersecurity
sponsored by Symantec Corporation
WEBCAST: This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement