IT Agents  >   Government Agencies (U.S.)  >  

Environment Protection Agency

RSS Feed    Add to Google    Add to My Yahoo!
Environment Protection Agency Multimedia (View All Report Types)
 
Climate Savers Computing Initiative
sponsored by Intel Corporation
PODCAST: Lorie Wigle discusses Intel's work through the newly launched initiative to establish innovative energy efficiency and power management targets for the computing industry. Find out how we can make a difference - one computer at a time.
Posted: 31 Oct 2007 | Premiered: Oct 31, 2007

Intel Corporation

US Office of Personnel Management Breach
sponsored by OpenDNS
PODCAST: In this podcast, you'll look into how the breach at the Office of Personnel Management happened and what could, or should, have been done to prevent such a catastrophe. Hear from former government employees who have had their personal data stolen as a result.
Posted: 16 Aug 2016 | Premiered: Jul 1, 2016

OpenDNS

How to Embed Digital Transformation in Your Agency
sponsored by Infor
WEBCAST: Government agencies need to simplify their websites and the ways in which they interact with citizens and users. Reserve a seat for an online training session Thursday, September 22nd at 2pm ET/ 11am PT to learn how agencies can handle digital transformations and the challenges that come with it.
Posted: 14 Sep 2016 | Premiered: Sep 14, 2016

Infor

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to Improve Talent Management Through Technology
sponsored by IBM
VIRTUAL ENVIRONMENT: What are the top issues of interest to HR managers, recruiters, IT professionals, and providers of talent management software and services? View this expert classroom to discover the role of technology in an organization's talent management strategy.
Posted: 28 Sep 2013 | Premiered: 10 Jan 2014

IBM

Case Study: Christie Digital Protects Big Data
sponsored by Commvault
VIDEO: In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.
Posted: 28 Apr 2016 | Premiered: 18 Nov 2015

Commvault

Experts Discuss the Benefits of Unified Virtual Server Data Protection
sponsored by Commvault
WEBCAST: In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.
Posted: 15 Apr 2016 | Premiered: Dec 9, 2015

Commvault

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

Cisco + Veeam: Maximize Availability for the Modern Data Center
sponsored by Veeam Software
WEBCAST: This webinar outlines a unique data availability strategy to help IT deliver the right performance, agility, and flexibility for the lowest TCO for virtualized environments. Tune in to learn more and see if it's right for your company.
Posted: 10 Feb 2016 | Premiered: Feb 10, 2016

Veeam Software

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Simplified Data Protection for the Modern Enterprise: An Expert Evaluation
sponsored by IBM
VIDEO: Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.
Posted: 29 Aug 2016 | Premiered: 30 Mar 2016

IBM

Best Practices for Virtualizing and Protecting Exchange Server
sponsored by Veeam Software
WEBCAST: In this webinar, join Michael van Horenbeeck, Exchange Server MVP and Clint Wyckoff, Veeam® Technical Evangelist and Microsoft MVP, as they discuss some of the most important considerations around Microsoft Exchange virtualization.
Posted: 14 Sep 2016 | Premiered: Mar 30, 2016, 01:07 EDT (05:07 GMT)

Veeam Software

NetApp + Veeam: Best practices and guidelines
sponsored by Veeam Software
WEBCAST: This webcast outline how to achieve enterprise-level, near-continuous data protection for applications in virtual environments. Tune in to learn more.
Posted: 10 Feb 2016 | Premiered: Feb 10, 2016

Veeam Software

Easy Cloud-Connected Backup
sponsored by Barracuda Networks Inc.
VIDEO: This brief video outlines a unified data protection solution that offers backup software as well as local support for both physical and virtual environments. Tune in to learn how this cloud-connected backup solution can help you minimize downtime in the event of a disaster and reduce your overall backup costs.
Posted: 13 Oct 2015 | Premiered: 07 Aug 2015

Barracuda Networks Inc.

Barracuda Backup: An All-In-One Cloud Integrated Solution
sponsored by Barracuda Networks
VIDEO: This lighthearted video introduces an all-in-one, cloud-integrated, backup solution. Watch now to see how you can protect your physical and virtual environments with an easy, cost-efficient solution.
Posted: 11 May 2016 | Premiered: 10 Jul 2015

Barracuda Networks

The Changing Landscape of Data Usage
sponsored by Commvault
VIDEO: In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.
Posted: 14 Apr 2016 | Premiered: 16 Oct 2015

Commvault

Software-Defined Storage Suite: How It Works
sponsored by IBM
VIDEO: In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.
Posted: 31 Aug 2016 | Premiered: 22 Dec 2015

IBM

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover 3 questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 28 Jul 2016 | Premiered: 20 Jul 2016

SearchSecurity.com

Overcome the Complexities of VDI Support
sponsored by SimpliVity
VIDEO: In this humorous video, a VDI professional struggles to find the best way to optimize his VDI. Take a look to learn what method he ultimately chooses and how you can apply that method to your VDI environment.
Posted: 17 Dec 2015 | Premiered: 17 Dec 2015

SimpliVity

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Six Key Capabilities For Securing Office 365 Email
sponsored by Proofpoint, Inc.
WEBCAST: Discover the 6 key capabilities enterprises should consider to secure their Office 365 email environment. Plus, learn common pitfalls to avoid in the planning stages.
Posted: 07 Sep 2016 | Premiered: Aug 1, 2016

Proofpoint, Inc.

Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement