Standards  >   Network Protocols  >   OSI Protocols  >  

Common Management Information Protocol

RSS Feed    Add to Google    Add to My Yahoo!
Common Management Information Protocol Multimedia (View All Report Types)
 
Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

SearchNetworking.com

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

HP Network Automation 9.00 Evaluation
sponsored by Hewlett Packard Enterprise
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett Packard Enterprise

Operational Excellence: Transforming Your Virtual Workplace and Digital Diversity
sponsored by Atos
VIDEO: Tune into this video to ensure continuity in the face of digitally disruptive technologies by discovering how to standardize granular business processes and enable dynamic construction of end-to-end computing capabilities. Take advantage of omni-channel support tailored to your digital environment.
Posted: 27 Jun 2016 | Premiered: 27 Jun 2016

Atos

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Zero-Day Attacks: Why you need a Deeper Level of Inspection
sponsored by Check Point Software Technologies Ltd.
VIDEO: Watch this video and learn ways to stop dangerous attacks with a deeper level of inspection. Tune in and you'll uncover comprehensive protection strategies from even the most dangerous attacks.
Posted: 25 Mar 2016 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Secure Your High-Value Assets in Half the Time
sponsored by Illumio
WEBCAST: This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Enterprise Mobility University: Enterprise BYOD Management
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: This classroom discusses security, application management, authentication, and best practices for developing and implementing a workable BYOD strategy.
Posted: 17 Mar 2014 | Premiered: 13 Mar 2014

SearchMobileComputing

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


Pain-Free Secure App Migration
sponsored by Illumio
WEBCAST: This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Expert guidance for DCIM: Data Center Information Management Solutions
sponsored by Schneider Electric
PODCAST: How can you ensure that your DCIM implementation will be a success? Tune into this podcast to discover how you can avoid the common pitfalls of DCIM software implementation and ensure the success of your DCIM strategy, and learn how to leverage scalable, modular architecture with strong vendor support.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
PODCAST: Tune into this podcast to discover how you can avoid 3 common pitfalls for DCIM software implementation. Access now to gain practical guidance for how to ensure the success of your DCIM strategy.
Posted: 09 May 2016 | Premiered: May 9, 2016

Schneider Electric

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this webcast to explore trends and challenges for today's healthcare providers. You'll learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned of how they tackled these common myths.
Posted: 11 Dec 2015 | Premiered: Dec 4, 2015

Dell, Inc. and Intel®

Leverage Agile for Speedy Delivery of High-Quality Software
sponsored by Magenic
WEBCAST: In this webcast, Forrester VP & Principal Analyst Diego Lo Giudice reveals common barriers to effective Agile development and explains how to overcome them to reap the full benefits of Agile. Discover how you can encourage both speed and quality by removing waste from development processes.
Posted: 06 Jan 2016 | Premiered: Jan 6, 2016

Magenic

HDAP: the Big Data LDAP Directory Storage
sponsored by Radiant Logic, Inc.
WEBCAST: In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.
Posted: 28 Mar 2016 | Premiered: Mar 15, 2016

Radiant Logic, Inc.

Extract Greater Value from Big Data with Red Hat Storage Server
sponsored by Red Hat
VIDEO: Tune into the following video to learn how Red Hat's Storage Server can help you monetize Big Data by empowering developers, architects, and data center operators to mine actionable insights out of your data. View now and uncover how this system works and see for yourself the benefits you can gain through successful deployment.
Posted: 11 Jan 2016 | Premiered: 11 Jan 2016

Red Hat

Debunking Myths About Learning
sponsored by Pluralsight
VIDEO: When it comes to workplace training, how can you separate fact from fiction and actually deliver value? Discover some of the most common lies about training and learn how to evaluate new training technologies to optimize the efficacy of your educational strategy.
Posted: 19 May 2016 | Premiered: 27 Aug 2015

Pluralsight

The Insiders' View: Spear Phishing and the Enterprise
sponsored by Cloudmark
VIDEO: This panel discussion dives into the topic of spear phishing, the most effective hacking technique facing organizations today.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016

Prelert

Modernizing Apps for the Web, Cloud and Mobile
sponsored by GizmoxTS
WEBCAST: In this exclusive on app modernization, uncover drivers for updating business app portfolios, potential benefits of leveraging cloud technologies, how IT leaders are tackling modernization projects and what you can do to avoid common obstacles.
Posted: 18 Mar 2016 | Premiered: Mar 3, 2016

GizmoxTS

Podcast: Modernizing Apps for the Web, Cloud and Mobile
sponsored by GizmoxTS
PODCAST: Tune in to this exclusive podcast to gain ideas and insights on how you can overcome common obstacles of modernizing your outdated apps for web, cloud, and mobile.
Posted: 22 Mar 2016 | Premiered: Mar 3, 2016

GizmoxTS

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement