Standards  >   Information Standards  >  

Federal Information Processing Standards

RSS Feed    Add to Google    Add to My Yahoo!
Federal Information Processing StandardsMultimedia (View All Report Types)
 
Information Governance: Buy Now or Pay Later (6 min clip)
sponsored by CommVault Systems, Inc.
WEBCAST: View the following webcast to hear from a renowned research firm as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.
Posted: 04 Feb 2014 | Premiered: Feb 4, 2014

CommVault Systems, Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

Social Media Governance & Security: Amplify Your Brand While Protecting Your Assets
sponsored by Hootsuite
WEBCAST: Social media is drastically altering the way businesses interact with clients, and while it provides great opportunity to increase brand awareness, it also brings significant risk. Choosing the right social media platform is paramount to ensuring security and maintaining compliance.
Posted: 21 Nov 2013 | Premiered: Nov 21, 2013

Hootsuite

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

Effectively Analyze SIEM: Data Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change management processes and security policies overall.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

Accelerate App Development with Open Source PaaS
sponsored by Red Hat
VIDEO: In this video, discover a cloud application platform as a service (PaaS) that enables developers to create scalable applications using whichever programming language and middleware they prefer. Watch now to explore the benefits and capabilities of this PaaS.
Posted: 27 Mar 2014 | Premiered: 11 Jul 2013

Red Hat

Desktop Virtualization Solutions Overview: Features, Benefits
sponsored by Cisco Systems, Inc.
VIDEO: View this video overview to hear about the features and benefits of an advanced desktop virtualization platform built upon leading technologies that delivers agile, cost-effective and reliable desktop virtualization for your business.
Posted: 15 Jul 2013 | Premiered: 15 Jul 2013

Cisco Systems, Inc.

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by CDW and IBM
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

CDW and IBM

The ServiceNow Service Automation Platform
sponsored by ServiceNow
WEBCAST: During this webinar, you will discover how ServiceNow is enabling organizations to increase their competitive agility, user satisfaction and productivity, all while enhancing IT's value to the business.
Posted: 29 Apr 2013 | Premiered: Apr 29, 2013

ServiceNow

ChangeBASE Datasheet
sponsored by Dell and Microsoft
WEBCAST: This whitepaper covers a solution that will help ensure the performance of your applications.
Posted: 20 Mar 2014 | Premiered: Mar 21, 2013

Dell and Microsoft

Virtual Desktop Solutions in the Federal Government
sponsored by VMware, Inc.
WEBCAST: This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.
Posted: 07 Feb 2012 | Premiered: Feb 7, 2012

VMware, Inc.

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

Information Governance - Information is a Strategic Asset (Telkom SA)
sponsored by IBM
VIDEOCAST: Hear Komalin Chetty describe how Telkom SA transformed information into a strategic asset through information governance in this video created for the 2010 Virtual IOD event.  Media library link includes a downloadable file and transcript to facilitate translation.
Posted: 17 Mar 2011 | Premiered: Mar 17, 2011

IBM

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Getting Mobile - Developing Your Mobility Plan
sponsored by BlackBerry
WEBCAST: This webcast will cover how to work with business groups to gather requirements, identify needs and select the most valuable approach to a wireless application.
Posted: 01 Aug 2007 | Premiered: Aug 16, 2007, 13:00 EDT (17:00 GMT)

BlackBerry

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

QuickTour Demo: Key Differentiators between MicroStrategy and Cognos
sponsored by MicroStrategy Incorporated
WEBCAST: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Cognos.
Posted: 09 Jun 2008 | Premiered: Jun 7, 2008

MicroStrategy Incorporated

Orion Network Configuration Manager (NCM)
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.
Posted: 14 Jul 2009 | Premiered: 14 Jul 2009

SolarWinds, Inc.

Cisco Prime Collaboration Manager (CM) 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Uncover the details of Cisco Prime Collaboration Manager to learn how you can gain deeper network visibility, all the way down to the granularity of video flow statistics, to ensure an optimal end-user experience for your users.
Posted: 02 Jul 2012 | Premiered: 04 Nov 2011

Cisco Systems, Inc.

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement