Software  >   Applications Software  >   Enterprise Applications Software  >   Supply Chain Software  >  

Event Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Event Management Software Multimedia (View All Report Types)
Supply Chain Insights: Keith Jacobson of Columbia
sponsored by GT Nexus
VIDEO: In this video, Keith Jacobson, Senior Director of Supply Chain at Columbia sportswear shares insights into their supply chain collaboration strategies. Connecting with suppliers in a cloud-based network allows Columbia to remove time and costs from the production lifecycle by empowering factories and suppliers to perform at a strategic level.
Posted: 06 Apr 2016 | Premiered: 06 Apr 2016

GT Nexus

GT Nexus Insights: Scott Hadwiger of Crocs
sponsored by GT Nexus
VIDEO: Scott Hadwiger of Crocs has helped eliminate paper and manual tasks from the PO, invoice, and settlement process. Greater collaboration continues to bolster Crocs' relationships with suppliers. In this short video listen as he describes the process of shifting Croc's supply chain process to a paperless one.
Posted: 05 Apr 2016 | Premiered: 05 Apr 2016

GT Nexus

Bentley University: Effective Space Planning with EAM Tools and CAD Drawings
sponsored by Infor
WEBCAST: In this webinar, learn how Bentley University tightly integrated EAM with AutoCAD space planning tools and added cloud connectivity benefits. Gain Shelby's perspective into how these technologies improved insight into asset data so she can plan the use of campus buildings more efficiently.
Posted: 23 Aug 2016 | Premiered: Aug 23, 2016


Supply Chain Finance in the Cloud: a New Approach to Increasing Capital, Reducing Risk and Assuring Supply
sponsored by GT Nexus
VIDEO: Access this in depth video to hear from training programs administrator Terica Adams, and Founder and Chief Strategy officer Kurt Cavano of GT Nexus. Listen as they discuss the benefits cloud technology innovation can provide for your supply chain finances.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

GT Nexus

Best Practices for Achieving Sustainable Supply Chains
sponsored by E2open
WEBCAST: Sustainable and green initiatives are becoming increasingly important in today's business climate, as companies restructure their supply chains to reduce their carbon footprint, while also improving their bottom line. This upcoming webinar sheds light on the move towards sustainable supply chain management.
Posted: 10 Apr 2009 | Premiered: Apr 9, 2009


How Do You Select ERP for Defense Manufacturing? – Podcast
sponsored by IFS
PODCAST: Find out how the unique characteristics of defense manufacturing operations affect their needs in the area of enterprise resource planning (ERP).
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014


SQL Diagnostic Manager: 2 Week Complimentary Trial
sponsored by Idera
SOFTWARE DOWNLOAD: To ensure optimal performance for your SQL Server, you need 24/7 monitoring to identify and diagnose issues quickly and effectively. Access a complimentary 14-day trial to SQL Diagnostic Manager.
Posted: 21 Jul 2014 | Premiered: 21 Jul 2014


Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016


Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012


Your Guide to Business Email Compromise
sponsored by Agari
PRODUCT DEMO: Go in-depth on the issue of BEC attacks, what steps they take to gain personal information from companies, and not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.
Posted: 19 Oct 2016 | Premiered: 19 Oct 2016


Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Search Security University: Cyber Security
sponsored by
VIRTUAL ENVIRONMENT: Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

SIM for Threat Monitoring Classroom
sponsored by
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016


Gatwick Airport Drives Security Efficiency with SIM Cloud Platform
sponsored by Splunk
WEBCAST: Tune into this on-demand webinar now to discover how Gatwick utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016


Simplify Your Google Apps Collaboration and Management with IDaaS
sponsored by OneLogin
WEBCAST: This informative webinar is designed to get you through the most complex of Google App deployments.
Posted: 29 Aug 2016 | Premiered: Jul 1, 2016


Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016


Beyond Certificate Management for Enterprises
sponsored by Certified Security Solutions (CSS)
WEBCAST: Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016


Cyberattacks that Transcend the Digital World
sponsored by OpenDNS
PODCAST: This informative podcast takes a look at the vast, interconnected systems supporting our daily life. How at risk are the industrial systems behind the light switch on your wall, the water out of your tap? Find out now.
Posted: 02 Sep 2016 | Premiered: Aug 1, 2016


Ransomware: The Identity of Attackers
sponsored by OpenDNS
PODCAST: Ransomware. It's everywhere, with thousands of infections daily, and unknown millions being made by unknown entities. This podcast looks at ransomware and how the cybercrime business operates.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016


Impactful Breaches in History: Ashley Madison
sponsored by OpenDNS
PODCAST: In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.
Posted: 17 Aug 2016 | Premiered: Jul 1, 2016


Data Access Governance Solutions On-Demand Demo
sponsored by STEALTHbits
WEBCAST: This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.
Posted: 14 Sep 2016 | Premiered: Dec 31, 2015


Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Thankfully, this free trial gives you the opportunity to experiment with a comprehensive unified security management product.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015


Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Ransomware — Anatomy of an Attack
sponsored by OpenDNS
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016


Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement