Software  >   Applications Software  >   Enterprise Applications Software  >   Supply Chain Software  >  

Event Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Event Management Software Multimedia (View All Report Types)
 
Case Study: How Walmart Promotes Sustainability With the Cloud
sponsored by Oracle Corporation
VIDEO: How was Walmart able to build a system to handle supplier relations and increase sustainability?Watch this concise video to hear from Robert Kaplan, director of product sustainability for Walmart. Listen as Robert details how cloud technology was able to help Walmart manage their supplier relations simply and easily to achieve their goals.
Posted: 16 Mar 2015 | Premiered: 16 Mar 2015

Oracle Corporation

Supply Chain Finance in the Cloud: a New Approach to Increasing Capital, Reducing Risk and Assuring Supply
sponsored by GT Nexus
VIDEO: Access this in depth video to hear from training programs administrator Terica Adams, and Founder and Chief Strategy officer Kurt Cavano of GT Nexus. Listen as they discuss the benefits cloud technology innovation can provide for your supply chain finances.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

GT Nexus

Best Practices for Achieving Sustainable Supply Chains
sponsored by E2open
WEBCAST: Sustainable and green initiatives are becoming increasingly important in today's business climate, as companies restructure their supply chains to reduce their carbon footprint, while also improving their bottom line. This upcoming webinar sheds light on the move towards sustainable supply chain management.
Posted: 10 Apr 2009 | Premiered: Apr 9, 2009

E2open

Free Trial: ObserveIT User Activity Monitoring
sponsored by ObserveIT
TRIAL SOFTWARE: ObserveIT enables you to identify and investigate suspicious user activity across your entire environment. Register for a free trial now and gain access to the full range of ObserveIT Enterprise features for 15 days.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

ObserveIT

Esker Accounts Payable Automation Customer Testimonials
sponsored by Esker Inc.
VIDEO: Watch this video to see what Esker Customers have to say about Esker's Accounts Payable Automation Software as a Service, invoice approval workflow and touchless processing capabilities.
Posted: 28 Jan 2015 | Premiered: 06 Dec 2013

Esker Inc.

The Social Workplace: IBM Connections Social Cloud
sponsored by IBM
VIDEO: This short video introduces IBM Connections Social Cloud, an innovative set of web-based collaboration and social networking services.
Posted: 06 Oct 2014 | Premiered: 06 Oct 2014

IBM

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

Download Unitrends Enterprise Backup, Free for 30 days
sponsored by Unitrends
SOFTWARE DOWNLOAD: This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.
Posted: 11 Jun 2014 | Premiered: 11 Jun 2014

Unitrends

Informatica Ultra Messaging
sponsored by Informatica
WEBCAST: Legacy messaging technologies lack the performance and flexibility necessary to support today’s computing environments. Attend this webinar to learn how Informatica’s Ultra Messaging technology can help realize up to 10x performance improvements over legacy messaging solutions while dramatically reducing costs and improving deployment flexibility.
Posted: 08 Dec 2010 | Premiered: Dec 8, 2010

Informatica

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Alternative Strategies to Mobile Device Security
sponsored by Maas360 by IBM
WEBCAST: This webcast offers an alternative to managing an entire mobile device and keeps enterprise data inside an encrypted container.
Posted: 24 Mar 2015 | Premiered: Jan 21, 2015

Maas360 by IBM

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Security Analytics Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this video, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

Top 5 Vulnerability Management Mistakes
sponsored by Risk IO
WEBCAST: Download this important webcast now to learn about the top five most common vulnerability management mistakes.
Posted: 23 Jan 2015 | Premiered: Jan 23, 2015

Risk IO

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Protecting your Organization’s Most Valuable Data
sponsored by IBM
WEBCAST: This webcast delves into how to find out the source of database information attacks. Watch now to explore multiple case studies of security breaches and how one data protection platform simplifies detecting and blocking rogue users.
Posted: 11 Mar 2015 | Premiered: Jan 15, 2015

IBM

Network Evolution University: Realizing the Benefits of Enterprise UC&C
sponsored by SearchUnifiedCommunications.com
VIRTUAL ENVIRONMENT: This virtual seminar focuses on how changing workforce practices are influencing unified communication strategies, how today's cloud UC services can serve businesses, and how your employees can communicate and collaborate effectively individually and in teams whether in the office, remote, or on the road.
Posted: 11 Jun 2013 | Premiered: 11 Jun 2013

SearchUnifiedCommunications.com

Simplifying Security in the Agile SDLC
sponsored by Veracode, Inc.
VIDEO: How do sophisticated software development shops inject secure development into their Agile software development lifecycle? Tune into this webcasts featuring experts Maria Loughlin and Rob Curtis from application security firm Veracode, to find out.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

Harnessing Data in the Internet of Things Webcast
sponsored by IBM
WEBCAST: Access this in-depth video with expert speaker Gary Barnett of Ovum to gain a better understanding of how your company can capitalize on the internet of things.
Posted: 26 Jan 2015 | Premiered: Dec 31, 2014

IBM

Case Study: Innovative Storage Paves the Way for Future Data Growth
sponsored by IBM
WEBCAST: A multi-faceted organization in Vancouver, British Columbia, Canada, which hosts over 100 events per year, deploy an innovative storage system to expand their storage capacity to support a steady increase in media content while allowing plenty of room for future growth.
Posted: 27 Sep 2013 | Premiered: Dec 31, 2012

IBM

Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback
sponsored by IBM
WEBCAST: View this webcast now to discover how one platform can help provide continuous quality assurance to reduce the time needed for the testing cycle.
Posted: 17 Oct 2014 | Premiered: Oct 17, 2014

IBM

Manage Your Applications in a Software Defined World
sponsored by Citrix
WEBCAST: Watch this on-demand joint webinar with Firefly to learn how to easily move from ACE to NetScaler and how this leads to a fully virtualized network integrating with Nexus switches today, and a software defined application infrastructure with Cisco ACI.
Posted: 26 Mar 2015 | Premiered: Dec 11, 2014

Citrix

Efficient Office App Management
sponsored by IBM
VIDEO: One mobile management solution for Office 365 is presented in this exclusive webcast.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

IBM

What defines an effective user experience?
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success.
Posted: 10 Mar 2014 | Premiered: Nov 17, 2013

Hewlett-Packard Limited

It's all about customer satisfaction
sponsored by Hewlett-Packard Company
WEBCAST: Top fashion brand Valentino was looking for innovative ways to serve their customers better. In this webcast, discover how Valentino made it drastically easier for customers to select and buy their products with fully integrated mobile applications.
Posted: 24 Feb 2014 | Premiered: Feb 24, 2014

Hewlett-Packard Company

Your Chance to Test Drive a Comprehensive Security System
sponsored by AlienVault
SOFTWARE DEMO: This product demo gives you an opportunity to test drive a unified security management system.
Posted: 24 Feb 2015 | Premiered: 24 Feb 2015

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement