IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Ethical Hacking

RSS Feed    Add to Google    Add to My Yahoo!
Ethical HackingMultimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Systems of Engagement: The Future of Enterprise IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, Forrester Research Vice President and Principal Analyst John McCarthy describes how systems of engagement are shaping the future of enterprise IT. Tune in to learn more today.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

Managed VDI Services & WaaS: What they mean to IT Leadership
sponsored by Dell, Inc.
WEBCAST: Cloud is an enabler to this transformation. Find out why the majority of IT leaders expect cloud to help them innovate, not just save money.
Posted: 14 Aug 2014 | Premiered: Jul 15, 2014

Dell, Inc.

Overcome Big Challenges with StruxureWare for Data Centers
sponsored by APC by Schneider Electric
VIDEO: You can have a single pane of glass to control and optimize your business through StruxureWare from Schneider Electric. No more scattered spreadsheets. No more functional silos. Download the video and discover how to reduce capital and operational expenditure by 30%.
Posted: 06 Nov 2014 | Premiered: 12 Jun 2013

APC by Schneider Electric

End-to-End System Performance: Delivering Continuity and Reliability
sponsored by Dell, Inc.
VIDEO: It's the goal of every IT leader to hit the timelines set forth in planning and executing a project – but for a global sporting event, the pressure is paramount. Learn from those who were in the trenches about the solutions used, to ensure everyone involved had the best experience possible.
Posted: 29 Aug 2014 | Premiered: 29 Aug 2014

Dell, Inc.

Tata Communications Speaks to Bill Haskins, Senior UC Analyst
sponsored by TATA Communications
VIDEO: In this video, Senior Unified Communications Analyst Bill Haskins explains how UC is used today and what is projected for the future.
Posted: 06 Nov 2014 | Premiered: 16 Jul 2013

TATA Communications

Top Benefits of Using a Single Management Tool Console
sponsored by CA Technologies.
WEBCAST: This exclusive webcast features a hands-on demo of a product that offers a single infrastructure management console.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

CA Technologies.

Trends in Converged Infrastructure Management
sponsored by CA Technologies.
WEBCAST: This exclusive webcast covers the results of a survey of top IT decision makers that reveals the emerging priorities of IT, the challenges facing IT and much more.
Posted: 19 May 2014 | Premiered: May 19, 2014

CA Technologies.

UK MSP Now Delivering a Reliably Consistent Service to Clients
sponsored by Autotask Corporation
VIDEO: This brief video covers a solution that can provide a consistent and reliable help desk and ticketing platform.
Posted: 30 Jan 2014 | Premiered: 30 Jan 2014

Autotask Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement