IT Agents  >   Government Agencies (U.S.)  >  

Environment Protection Agency

RSS Feed    Add to Google    Add to My Yahoo!
Environment Protection Agency Multimedia (View All Report Types)
 
Climate Savers Computing Initiative
sponsored by Intel Corporation
PODCAST: Lorie Wigle discusses Intel's work through the newly launched initiative to establish innovative energy efficiency and power management targets for the computing industry. Find out how we can make a difference - one computer at a time.
Posted: 31 Oct 2007 | Premiered: Oct 31, 2007

Intel Corporation

The Six Key Inflection Points You Can't Ignore in IT Infrastructure and Operations
sponsored by NetEnrich
VIDEO: In this webcast, Raju Chekuri, CEO of NetEnrich, addresses the constantly shifting landscape of IT and several best practices that will help you excel at meeting your specific IT demands. Tune in now to discover and solve the 6 key challenges faced when optimizing your operations for the cloud.
Posted: 07 Dec 2015 | Premiered: 17 Aug 2015

NetEnrich

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

How to Improve Talent Management Through Technology
sponsored by IBM
VIRTUAL ENVIRONMENT: What are the top issues of interest to HR managers, recruiters, IT professionals, and providers of talent management software and services? View this expert classroom to discover the role of technology in an organization's talent management strategy.
Posted: 28 Sep 2013 | Premiered: 10 Jan 2014

IBM

Take control of your data center: Streamline and protect your IT environment
sponsored by BMC
TRIAL SOFTWARE: Are you using data center automation to streamline and protect your IT environment? Discover how to deliver a higher level of security and compliance, accelerate vulnerability resolution and avoid major security incidents.
Posted: 22 Mar 2016 | Premiered: 21 Mar 2016

BMC

Case Study: Christie Digital Protects Big Data
sponsored by Commvault
VIDEO: In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.
Posted: 28 Apr 2016 | Premiered: 18 Nov 2015

Commvault

Experts Discuss the Benefits of Unified Virtual Server Data Protection
sponsored by Commvault
WEBCAST: In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.
Posted: 15 Apr 2016 | Premiered: Dec 9, 2015

Commvault

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

Public or Private, Instances in the Cloud Need Protection
sponsored by Unisys
VIDEO: Explore capabilities that conceal your instances in both private and public cloud environments.
Posted: 18 May 2016 | Premiered: 18 May 2016

Unisys

Cisco + Veeam: Maximize Availability for the Modern Data Center
sponsored by Veeam Software
WEBCAST: This webinar outlines a unique data availability strategy to help IT deliver the right performance, agility, and flexibility for the lowest TCO for virtualized environments. Tune in to learn more and see if it's right for your company.
Posted: 10 Feb 2016 | Premiered: Feb 10, 2016

Veeam Software

NetApp + Veeam: Best practices and guidelines
sponsored by Veeam Software
WEBCAST: This webcast outline how to achieve enterprise-level, near-continuous data protection for applications in virtual environments. Tune in to learn more.
Posted: 10 Feb 2016 | Premiered: Feb 10, 2016

Veeam Software

Easy Cloud-Connected Backup
sponsored by Barracuda Networks Inc.
VIDEO: This brief video outlines a unified data protection solution that offers backup software as well as local support for both physical and virtual environments. Tune in to learn how this cloud-connected backup solution can help you minimize downtime in the event of a disaster and reduce your overall backup costs.
Posted: 13 Oct 2015 | Premiered: 07 Aug 2015

Barracuda Networks Inc.

Barracuda Backup: An All-In-One Cloud Integrated Solution
sponsored by Barracuda Networks
VIDEO: This lighthearted video introduces an all-in-one, cloud-integrated, backup solution. Watch now to see how you can protect your physical and virtual environments with an easy, cost-efficient solution.
Posted: 11 May 2016 | Premiered: 10 Jul 2015

Barracuda Networks

The Changing Landscape of Data Usage
sponsored by Commvault
VIDEO: In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.
Posted: 14 Apr 2016 | Premiered: 16 Oct 2015

Commvault

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Overcome the Complexities of VDI Support
sponsored by SimpliVity
VIDEO: In this humorous video, a VDI professional struggles to find the best way to optimize his VDI. Take a look to learn what method he ultimately chooses and how you can apply that method to your VDI environment.
Posted: 17 Dec 2015 | Premiered: 17 Dec 2015

SimpliVity

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot

Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX
sponsored by Vision Solutions
PODCAST: This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.
Posted: 09 May 2008 | Premiered: May 9, 2008

Vision Solutions

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST: This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

Fujitsu

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42

Complete Protection for VMware Environments with HP Data Protector Software
sponsored by Hewlett Packard Enterprise
WEBCAST: View this web tutorial to learn about the challenges and solutions for complete data protection in your VMware environment.
Posted: 18 Nov 2009 | Premiered: Nov 18, 2009

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement