IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hacking

RSS Feed    Add to Google    Add to My Yahoo!
Ethical Hacking Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Video Part 2: Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Jamie Tischart, Intel's CTO for Cloud/SaaS, offers privacy questions to ask your cloud service provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Hightail Chooses IBM for Storage That Grows With Its Data
sponsored by IBM
WEBCAST: Learn how Hightail reduced costs, increased storage and cut power consumption by 30% with IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Magic Quadrant for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Find out the strengths and cautions for the vendors in Gartner's SIEM Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

How High-Performance Storage Drives Competitive Advantage
sponsored by NetApp SolidFire
VIDEO: A managed backup provider describes how its solution lets it scale linearly and segment clouds the way it wants to.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

The Total Economic Impact of Cleversafe
sponsored by IBM
WEBCAST: Forrester found that Cleversafe costs 72% less than similar RAID solutions. See further savings and business benefits.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

UZ Leuven Supports Mission-Critical SAP Data with Flash
sponsored by NetApp
VIDEO: Learn why UZ Leuven relies on Flash technology to support their mission-critical SAP data.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement