IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  


RSS Feed    Add to Google    Add to My Yahoo!
CERT Multimedia (View All Report Types)
IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

ManageEngine OpManager 8.5
sponsored by ManageEngine
TRIAL SOFTWARE: OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc.
Posted: 27 Jul 2010 | Premiered: 27 Jul 2010


Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011


Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010


Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


Enterprise IAM
sponsored by
VIRTUAL ENVIRONMENT: Hackers have recently launched major attacks on enterprise systems by using weaknesses in third-party vendor security. This classroom on third-party IAM explores how enterprise InfoSec pros can manage vendors who have, by the nature of their work, access to enterprise systems.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without changing the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


Reduce DR RTO by 80% – New Value for VCE
sponsored by VMware
WEBCAST: This webcast details how network virtualization can reduce disaster recovery's recovery time. Tune in to learn how you can utilize this technology with a virtualization platform.
Posted: 21 Aug 2015 | Premiered: Aug 21, 2015


Web Security: Revenge of the Vuln
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement