IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits Multimedia (View All Report Types)
 
Targeted Marketing Your Rivals Can't Copy: Lessons From Data Capital
sponsored by Oracle Corporation
WEBCAST: 90% of today's data has been created in the last two years, most of it outside the enterprise. Access this webcast to leverage the big data expertise of Paul Sonderegger, Oracle Big Data Strategist, and get the most out of your data.
Posted: 22 Feb 2017 | Premiered: Feb 22, 2017

Oracle Corporation

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

How IoT Will Transform the Retail Industry
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how retailers can connect data from IoT devices, in-store interactions, mobile apps, and more to create and share insights across departments that boost sales and customer experiences.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

Rackspace Customer Story: International payments provider OFX migrates to AWS
sponsored by Rackspace
VIDEO: Tune into this brief video to see OFX, a foreign exchange platform, undertake a transformative migration project to AWS Cloud, and discover how AWS empowers one to deliver the quick, innovative functionality customers are demanding through increased flexibility, scalability and resilience of a cloud environment.
Posted: 19 Apr 2017 | Premiered: 01 Mar 2017

Rackspace

PPM for Streamlined Product Development: Video Demo
sponsored by Innotas by Planview
VIDEO: Watch this brief video to learn about a portfolio management platform that helps streamline product development from ideation through launch. You'll discover key features that enhance pipeline prioritization, capacity planning, and resource management.
Posted: 21 Apr 2017 | Premiered: 21 Apr 2017

Innotas by Planview

The Essential Guide to Machine Data
sponsored by Splunk
VIDEO: This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches.
Posted: 23 May 2017 | Premiered: 06 Mar 2017

Splunk

Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO: Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

A Perspective on U.S. Health Industry Changes
sponsored by IBM
VIDEO: Director of Health Industry Transformation at IBM gives his perspective on the changes impacting U.S. Healthcare.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

The Future of Privileged Management: Understanding the Bigger Picture
sponsored by One Identity
VIDEO: Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.
Posted: 16 Mar 2017 | Premiered: 08 Dec 2016

One Identity

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Splunk Everywhere! Ransomware
sponsored by Splunk
WEBCAST: Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed.
Posted: 23 May 2017 | Premiered: May 23, 2017

Splunk

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

What Keeps CIOs Awake at Night: Risk Reduction and Data Recovery
sponsored by Commvault
VIDEO: This video explores how one backup and recovery system helps increase businesses' confidence in their ability to protect critical data. Find out what Phil Goodwin, a research director at IDC, has to say about alleviating the fears of IT leaders and storage pros.
Posted: 24 Oct 2016 | Premiered: 08 Mar 2016

Commvault

Symantec GDPR
sponsored by Symantec & Blue Coat Systems
VIDEO: With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.
Posted: 16 Jun 2017 | Premiered: 06 Jun 2017

Symantec & Blue Coat Systems

A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

Take Command of Vendor Audits with Accurate IT Data
sponsored by BDNA
WEBCAST: This webcast offers information on why audits can turn into timely, costly, and complex processes, and how the amount, relevancy, and accuracy of the data can affect the audits.
Posted: 01 Nov 2016 | Premiered: Oct 12, 2016

BDNA

Discover devices, audit software installs & track usage across the network
sponsored by Snow Software
VIDEO: With the modern professional working remotely, from their own devices, at any time of day, the amount of hardware and software consumed has risen exponentially. Watch this short video on a Snow Software asset management tool that will give your organization the ability to track software deployments and usage easily.
Posted: 22 Mar 2017 | Premiered: 26 Aug 2015

TOPICS:  Licensing
Snow Software

SAM Hero - Christian Bjorkly-Nordstrom from Saab - How to use Snow's SAM Platform
sponsored by Snow Software
VIDEO: If you've been audited by a software provider you know what a hassle it can be. Watch this quick video to see how the Global License Compliance Manager at Saab stays prepared for the dreaded audit with a Software Asset Management (SAM) tool.
Posted: 20 Mar 2017 | Premiered: 05 Oct 2016

TOPICS:  Licensing
Snow Software

What Auditors Think about Crypto
sponsored by Thales
WEBCAST: Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries.
Posted: 09 May 2011 | Premiered: May 9, 2011, 11:00 EDT (15:00 GMT)

Thales

Six Best Practices to Prevent Enterprise Data Loss
sponsored by RSA
VIDEO: Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
Posted: 05 Feb 2009 | Premiered: 05 Feb 2009

RSA

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold
sponsored by IBM
VIDEO: One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

IBM

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement