IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hackers

RSS Feed    Add to Google    Add to My Yahoo!
Ethical Hackers Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Linking App Development to Hybrid Cloud Operations
sponsored by Embotics
WEBCAST: Learn about issues facing cloud application development today. Discover how IT can enable the high-speed, automated, highly interconnected nature of DevOps while at the same time ensuring proper controls.
Posted: 22 Aug 2016 | Premiered: Feb 29, 2016

Embotics

Four Common Types of Private Cloud
sponsored by Commvault
VIDEO: Forrester's Dave Bartoletti discusses the four types of private cloud and their respective benefits and challenges.
Posted: 06 Oct 2016 | Premiered: 06 Oct 2016

TOPICS:  IT Management
Commvault

Critical Capabilities for Object Storage
sponsored by IBM
WEBCAST: In this Gartner study, understand how 12 object storage products compare against seven critical capabilities.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Road Map: The Data Security and Privacy Playbook
sponsored by IBM
WEBCAST: Consider these five key characteristics when modernizing your legacy file transfer environment with MFT technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Data Exfiltration in Depth
sponsored by Intel Security
VIDEO: Deepen your understanding of data exfiltration with a presentation from two industry experts.
Posted: 21 Sep 2016 | Premiered: 21 Sep 2016

TOPICS:  IT Management
Intel Security

The Total Economic Impact of Cleversafe
sponsored by IBM
WEBCAST: Forrester found that Cleversafe costs 72% less than similar RAID solutions. See further savings and business benefits.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Video Part 3: Operational Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS, Jamie Tischart, presents the operational questions to ask your cloud service provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement