IT Management  >   Systems Operations  >   Data Management  >  

Data Audits

RSS Feed    Add to Google    Add to My Yahoo!
Data Audits Multimedia (View All Report Types)
 
Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

Targeted Marketing Your Rivals Can't Copy: Lessons From Data Capital
sponsored by Oracle Corporation
WEBCAST: 90% of today's data has been created in the last two years, most of it outside the enterprise. Access this webcast to leverage the big data expertise of Paul Sonderegger, Oracle Big Data Strategist, and get the most out of your data.
Posted: 22 Feb 2017 | Premiered: Feb 22, 2017

Oracle Corporation

Case Study: How Rubicon Project Uses A DB Technology To Power Their Global Business
sponsored by Aerospike
VIDEO: In this case study, learn which database Rubicon Project, an AdTech company, uses to handle their billions of daily global transactions. Uncover why they chose to use this particular database, and the benefits of their chosen technology.
Posted: 20 Mar 2017 | Premiered: 12 Aug 2016


Cherwell Service Management Product Overview Video
sponsored by Cherwell
VIDEO: If you organization is looking to implement, update, or automate ITSM, watch this brief video to learn about Cherwell Service Management software and its key features, including out of the box ITIL certified processes, a modern, intuitive self-service portal, codeless technology, and more.
Posted: 12 Apr 2017 | Premiered: 06 Sep 2016

Cherwell

IT Solutions Provider Fit Revamps Data Center Ecosystem for SAP Appliance Support
sponsored by Lenovo
VIDEO: Watch this video to learn how Fit achieved greater return on investment from its physical data center space—including its expansive HANA appliances—for scalable growth with the right server architecture.
Posted: 20 Mar 2017 | Premiered: 15 Mar 2017

Lenovo

Fulfilling the Promise of Omnichannel Retailing
sponsored by IBM
WEBCAST: Synchronize the consumer experience with the back-end operations through modernized B2B integration.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Gain Speed and Grow Faster with the Cloud
sponsored by IBM
WEBCAST: Simplify your B2B integration strategy with the cloud to improve collaboration with suppliers and customers.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Rapidly Turn Innovation Into Value With Digitalisation
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how digitalisation allows AkzoNobel to accelerate innovation and work smarter.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

7 Questions to Achieve GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more.
Posted: 07 Apr 2017 | Premiered: Nov 18, 2016

Hewlett-Packard Enterprise

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Information Insight for GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WEBCAST: Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more.
Posted: 06 Apr 2017 | Premiered: Feb 5, 2017

Hewlett-Packard Enterprise

How the Game of Application Security is Changing
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn how a Runtime Application Self-Protection (RASP) can shore up the protection that traditional perimeter defenses are lacking against modern threats.
Posted: 10 Mar 2017 | Premiered: Nov 16, 2016

Hewlett Packard Enterprise

How to Implement a Continuous Application Monitoring Security Initiative
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn how to protect your applications with a continuous application monitoring security initiative, ensuring that your organization's apps in production are secure and stay secure once launched.
Posted: 13 Mar 2017 | Premiered: Mar 13, 2017

Hewlett Packard Enterprise

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


Your In-Depth Guide to GDPR
sponsored by Oracle Corporation UK Ltd
WEBCAST: Gain an overview of what the key objectives of the general data protection regulation (GDPR) are, what it means for your organization, and what impact it will have on your business.
Posted: 13 Apr 2017 | Premiered: Apr 11, 2017

Oracle Corporation UK Ltd

The Future of Privileged Management: Understanding the Bigger Picture
sponsored by One Identity
VIDEO: Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.
Posted: 16 Mar 2017 | Premiered: 08 Dec 2016

One Identity

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

Detect Ransomware Before its's Too Late
sponsored by AlienVault
WEBCAST: View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.
Posted: 06 Feb 2017 | Premiered: Feb 2, 2017

AlienVault

What Keeps CIOs Awake at Night: Risk Reduction and Data Recovery
sponsored by Commvault
VIDEO: This video explores how one backup and recovery system helps increase businesses' confidence in their ability to protect critical data. Find out what Phil Goodwin, a research director at IDC, has to say about alleviating the fears of IT leaders and storage pros.
Posted: 24 Oct 2016 | Premiered: 08 Mar 2016

Commvault

A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

Take Command of Vendor Audits with Accurate IT Data
sponsored by BDNA
WEBCAST: This webcast offers information on why audits can turn into timely, costly, and complex processes, and how the amount, relevancy, and accuracy of the data can affect the audits.
Posted: 01 Nov 2016 | Premiered: Oct 12, 2016

BDNA

Discover devices, audit software installs & track usage across the network
sponsored by Snow Software
VIDEO: With the modern professional working remotely, from their own devices, at any time of day, the amount of hardware and software consumed has risen exponentially. Watch this short video on a Snow Software asset management tool that will give your organization the ability to track software deployments and usage easily.
Posted: 22 Mar 2017 | Premiered: 26 Aug 2015

TOPICS:  Licensing
Snow Software

SAM Hero - Christian Bjorkly-Nordstrom from Saab - How to use Snow's SAM Platform
sponsored by Snow Software
VIDEO: If you've been audited by a software provider you know what a hassle it can be. Watch this quick video to see how the Global License Compliance Manager at Saab stays prepared for the dreaded audit with a Software Asset Management (SAM) tool.
Posted: 20 Mar 2017 | Premiered: 05 Oct 2016

TOPICS:  Licensing
Snow Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement