IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

EPC

RSS Feed    Add to Google    Add to My Yahoo!
EPC Multimedia (View All Report Types)
 
The 5 Levels of IT Service Optimization Maturity
sponsored by TeamQuest Corporation
WEBCAST: This webcast explores the 5 levels of IT service optimization maturity and how that affects business outcomes.
Posted: 16 Jun 2015 | Premiered: Jun 16, 2015

TeamQuest Corporation

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Unseen Challenges in Protecting Corporate Credentials
sponsored by IBM
WEBCAST: Tune in to this critical webinar to hear Eve Maler, Principal Analyst at Forrester Research, Inc., and Trusteer's Christopher Beier expose the common mistakes that cause corporate credential breaches, and explain how you can better fortify your employee's credentials against these attacks.
Posted: 01 Aug 2014 | Premiered: Mar 13, 2014

IBM

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
EPC White Papers | EPC Multimedia | EPC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement