IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hacking

RSS Feed    Add to Google    Add to My Yahoo!
Ethical HackingMultimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

HP vs. Cisco – Which IT Management System Came Out on Top?
sponsored by HP and Intel
WEBCAST: Watch this webcast to find out which IT management system proved to be the better choice.
Posted: 04 Feb 2014 | Premiered: Sep 25, 2013

HP and Intel

HP Fundamentals: Decreasing IT Risk in the age of cloud, big data, and virtualization
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative webcast to discover how you can lower the risk of adopting more complex IT innovations, such as cloud and virtualization, so your organization can reap the benefits of such technologies without sacrificing security.
Posted: 07 Apr 2014 | Premiered: Apr 2, 2014

Hewlett-Packard Company

Top Benefits of Using a Single Management Tool Console
sponsored by CA Technologies.
WEBCAST: This exclusive webcast features a hands-on demo of a product that offers a single infrastructure management console.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

CA Technologies.

Solving Your Biggest IT Challenges with VMware Virtualization
sponsored by VMware, Inc.
WEBCAST: This resource is a series of webcasts providing solutions to solving your biggest IT challenges with VMware virtualization.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

VMware, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Storage Response Time Monitor
sponsored by SolarWinds, Inc.
SOFTWARE DOWNLOAD: Having trouble with storage latency issues? SolarWinds® Storage Response Time Monitor free tool tracks those sluggish VMs, shows the top host to datastore total response times and a count of additional high latency offenders.
Posted: 03 Aug 2012 | Premiered: 03 Aug 2012

SolarWinds, Inc.

Continuous Testing applications deployed on IBM WebSphere software
sponsored by IBM
WEBCAST: This on-demand webcast reveals how the right test automation and service virtualization strategy can help teams test applications earlier and accelerate software delivery.
Posted: 06 Mar 2014 | Premiered: Dec 31, 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement