Vertical Industries  >   Consumer Packaged Goods Industry  >   Consumer Electronics Industry  >  

Gaming Devices Industry

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Devices Industry Multimedia (View All Report Types)
Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010


Webcast: Global Hyper-Convergence 101: An Industry-Leading Advantage
sponsored by Pivot3
WEBCAST: In this webinar, Bob Haas, Sales Engineering Team Lead at Pivot3, highlights one hyper-converged infrastructure (HCI) software solution that will ensure fault tolerance without replicating data. Access this video now to get an insider look at how to differentiate HCI provider offerings based on industry.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014


Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Healthcare turns to Big Data Projects
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

Medical Device Cybersafety - Separating Hype from Substance
sponsored by Symantec & Intuitive
WEBCAST: In this webcast, distinguished healthcare architect Axel Wirth reviews the difference between healthcare data compliance vs. security and the risks medical devices introduce to healthcare organizations. View now to learn medical device security priorities and best practices in order to avoid compliance failure and data loss.
Posted: 10 Nov 2015 | Premiered: Oct 20, 2015

Symantec & Intuitive

Case Study: Klinikum Wels-Grieskirchen Improves their Storage
sponsored by Hitachi Data Systems
VIDEO: Tune in to this video and learn how CIO Elmar Flamme enabled one prominent Austrian healthcare organization with a highly accessible, secure and long-term archiving strategy.
Posted: 29 Sep 2015 | Premiered: 13 Oct 2010

Hitachi Data Systems

Imprivata OneSign Streamlines Workflows at Augusta Health
sponsored by Imprivata
VIDEO: This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information.
Posted: 10 Apr 2014 | Premiered: 24 Jun 2013


The Power of Cloud-Based Software-as-a-Service (SaaS)
sponsored by PR Television
WEBCAST: In this webcast, learn about the four major areas that all organizations should address to ensure mobile workforce security and learn about recent developments in the malware landscape and BYOD security.
Posted: 15 Oct 2015 | Premiered: Oct 15, 2015

PR Television

Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Chief Financial Officer Virtual Event: Spotlight on the Modern CFO
sponsored by Workday
WEBCAST: Access this webinar to gain an understanding of how disruptive technology - such as data analytics, cloud computing, mobile, etc. - can help CFOs take advantage of change and outperform their peers.
Posted: 26 Oct 2015 | Premiered: Jul 22, 2015


How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015


How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Enterprise
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Enterprise

Search Security University: Cyber Security
sponsored by
VIRTUAL ENVIRONMENT: Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015


The Path to Becoming a Mobile Enterprise: API-Led Connectivity
sponsored by MuleSoft
WEBCAST: In this webcast, you'll gain access to an expert discussion on the opportunities that mobile can bring to your enterprise, as well as the biggest roadblocks that companies face on the journey to successful mobile delivery.
Posted: 03 Nov 2015 | Premiered: Feb 26, 2015


How Beth Israel Ensures That Information Is Where It's Needed, When It's Needed
sponsored by Commvault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data, making it secure, compliant, and accessible as needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement