IT Agents  >   Standards Organizations  >   National Standards Organizations  >  

Canadian Standards Organization

RSS Feed    Add to Google    Add to My Yahoo!
Canadian Standards Organization Multimedia (View All Report Types)
 
The Business of IT Transformation: Breaking Down the Vagaries
sponsored by Rackspace
WEBCAST: If you're feeling overwhelmed trying to grow your business—you're not alone. Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect "digital transformation" and highlight the challenges driving businesses like yours to the cloud, with an actionable cloud implementation checklist.
Posted: 23 Jun 2017 | Premiered: Mar 29, 2017

Rackspace

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Video Meeting for Remote Teams
sponsored by Logitech Inc.
VIDEO: Making collaboration a top priority will help your organization achieve increased productivity and positive, measurable results. In this short video, learn more about the power of collaboration and discover tips for making it a more effective tool at your enterprise.
Posted: 27 Feb 2017 | Premiered: 16 Feb 2017


How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

Market Perspectives: The Benefits of Improving RTOs
sponsored by Commvault
VIDEO: In this brief video, IDC research director Phil Goodwin shares the findings of a recovery time objective survey. Find out which company was able to cut unplanned downtime by more than 50% to produce unprecedented cost savings and provide more reliable availability of data.
Posted: 13 Oct 2016 | Premiered: 08 Mar 2016

Commvault

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

IBM Cloud Object Storage
sponsored by IBM
VIDEO: Watch this brief video to learn how to manage rapidly increasing data volumes from cloud, mobile, and IoT at scale with cloud object storage. By tuning in, you'll find a hybrid strategy to accommodate unstructured data, and more.
Posted: 25 May 2017 | Premiered: 02 Feb 2017

IBM

Sky and Cleversafe Object Storage: Managing Rapid Data Growth Case Study
sponsored by IBM
VIDEO: Watch this brief video study to learn how Sky partnered with Cleversafe and used their web-scale cloud object storage platform to make big data manageable and meet the demand for immediate access.
Posted: 25 May 2017 | Premiered: 16 Aug 2016

IBM

Podcast - How to Produce an Actionable IT Service Catalog
sponsored by newScale, Inc.
PODCAST: The ITIL (IT Infrastructure Library) best practice framework advocates that IT organizations produce a Service Catalog to document and communicate standard service offerings. As the cornerstone for IT-business alignment, the Service Catalog is...
Posted: 07 Oct 2008 | Premiered: Oct 7, 2008

newScale, Inc.

Webcast: Moving Beyond the "Hype" in Hyperconvergence
sponsored by VeriStor
WEBCAST: Before getting swept up in hyperconverged's promises, you must look beyond the hype to determine if it's a suitable fit – and, more importantly, where and when HCI is appropriate by offering workload analysis of ROBOs, VDI, green field environments, and app development, and more.
Posted: 01 May 2017 | Premiered: May 1, 2017

VeriStor

GFI PCI Suite
sponsored by GFI Software
TRIAL SOFTWARE: The GFI PCI Suite is a package comprising the core software required for PCI DSS compliance.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007

GFI Software

What Auditors Think about Crypto
sponsored by Thales
WEBCAST: Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries.
Posted: 09 May 2011 | Premiered: May 9, 2011, 11:00 EDT (15:00 GMT)

Thales

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers
sponsored by ComputerWeekly.com
WEBCAST: When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development.
Posted: 26 Oct 2011 | Premiered: Jan 10, 2011

ComputerWeekly.com

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

SearchNetworking.com

Extreme Transaction Processing: Electronic trading at NYMEX
sponsored by Progress
WEBCAST: This Webcast explores a method for increasing the capacity of messaging infrastructure in order to support greater message throughput and future organizational growth.
Posted: 28 Sep 2007 | Premiered: Sep 28, 2007

Progress

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

SQL Server Podcast: Keeping Business-Critical Data Secure and Valuable
sponsored by Hewlett Packard Enterprise
PODCAST: It's time to modernize your core mission-critical business processing environment. Listen to this podcast now to explore ways you can balance the needs of your apps, power your mission critical apps, analyze in real-time, and more.
Posted: 13 Oct 2016 | Premiered: Oct 6, 2016

Hewlett Packard Enterprise

Top four considerations for securing Microsoft SharePoint
sponsored by Sophos, Inc.
WEBCAST: This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.
Posted: 08 Mar 2011 | Premiered: Mar 8, 2011

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement