Vertical Industries  >  

Electronic Equipment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Equipment Industry Multimedia (View All Report Types)
 
Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

The Move to All-Flash at the University of Kansas Health Systems
sponsored by Pure Storage + Cisco
WEBCAST: Discover how the University of Kansas Health System was able to meet and surpass the requirements for Epic's Honor Roll by eliminating storage as a performance bottleneck.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Pure Storage + Cisco

Top 3 Ways Enterprise Asset Management Can Decrease Your Operating Costs
sponsored by Infor
WEBCAST: There are many business drivers for enterprise asset management (EAM), including reducing production downtime and increasing labor productivity. But do you know what kind of EAM technology is best for your business? Learn how the latest EAM technologies can help you manage and decrease operating costs, while increasing your return on assets.
Posted: 20 Jul 2016 | Premiered: Jul 20, 2016

Infor

Cash Management in the Digital Age, Podcast Part 2
sponsored by Dell EMC, Axxiome & Intel®
PODCAST: In this podcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management, as well as how SAP HANA appliances accelerate the analysis of cash management information.
Posted: 01 Aug 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age, Podcast Part 3
sponsored by Dell EMC, Axxiome & Intel®
PODCAST: In this podcast, hear from experts Leon Sinclair and Jody Ellis oh how to improve cash management with a platform that runs on SAP HANA and accelerates the analysis of cash management information.
Posted: 01 Aug 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age
sponsored by Dell EMC, Axxiome & Intel®
WEBCAST: In this webcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management for the modern financial technology landscape in conjunction with SAP environments.
Posted: 27 Jul 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age, Part 2
sponsored by Dell EMC, Axxiome & Intel®
WEBCAST: In this webcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management, as well as how SAP HANA appliances accelerate the analysis of cash management information.
Posted: 28 Jul 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age, Part 3
sponsored by Dell EMC, Axxiome & Intel®
WEBCAST: In this webcast, hear from experts Leon Sinclair and Jody Ellis oh how to improve cash management with a platform that runs on SAP HANA and accelerates the analysis of cash management information.
Posted: 28 Jul 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Cash Management in the Digital Age Podcast
sponsored by Dell EMC, Axxiome & Intel®
PODCAST: In this podcast, hear from experts Leon Sinclair and Jody Ellis on how to improve cash management for the modern financial technology landscape in conjunction with SAP environments.
Posted: 31 Jul 2017 | Premiered: Jul 26, 2017

Dell EMC, Axxiome & Intel®

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco Umbrella
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco Umbrella

New Roles and Opportunities for Payers
sponsored by HealthEdge
VIDEO: Learn about the opportunities that payers have with better technology and information systems, and how to bend the cost curve of healthcare while building a loyal relationship with patients along the way.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

HealthEdge Advice to Peers: Real-World Examples
sponsored by HealthEdge
VIDEO: Health plan leaders who implemented HealthEdge -- a core administration and care coordination system for transformative health plans – spoke about their experiences.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

The New Rules For Skills-Based Routing to Improve Your Customer Experience
sponsored by Mitel Networks Limited
VIDEO: Skills-based routing has been around for a long time, but now it has evolved to the point where it has become a key differentiator for contact centers looking to enhance their customer experiences. Learn how to redefine skills-based routing to filter interactions with customers via calls, email, web chat, and SMS.
Posted: 10 Aug 2017 | Premiered: 27 Jul 2017

Mitel Networks Limited

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement