IT Agents  >   Government Agencies (U.S.)  >   Department of Commerce  >   National Telecommunications and Information Administration  >  

ITS

RSS Feed    Add to Google    Add to My Yahoo!
ITS Multimedia (View All Report Types)
 
IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

The Six Key Inflection Points You Can't Ignore in IT Infrastructure and Operations
sponsored by NetEnrich
VIDEO: In this webcast, Raju Chekuri, CEO of NetEnrich, addresses the constantly shifting landscape of IT and several best practices that will help you excel at meeting your specific IT demands. Tune in now to discover and solve the 6 key challenges faced when optimizing your operations for the cloud.
Posted: 07 Dec 2015 | Premiered: 17 Aug 2015

NetEnrich

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Future Proof Your Dashboard: Achieve Long-Term IT & Business Alignment
sponsored by TeamQuest Corporation
PODCAST: Explore the insights about business value dashboards as described by Rich Razon, Head of Business Development at TeamQuest. Learn why organizations of all kinds can leverage dashboards to turn operations metrics into business value metrics, enabling business leaders to gain clarity into the way IT is or isn't propelling the organization forward.
Posted: 02 Jun 2016 | Premiered: May 16, 2016

TeamQuest Corporation

Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

SearchCIO.com

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Why B2B Integration?
sponsored by IBM
WEBCAST: Information exchange is what keeps the world running. This brief video showcases a B2B integration strategy that can simplify multi-enterprise processes, increasing efficiency and ensuring delivery of exceptional experiences to your customers.
Posted: 20 Oct 2015 | Premiered: Feb 11, 2015

IBM

Why Customers Resist Modernizing Their B2B Platform
sponsored by IBM
WEBCAST: In this webcast, learn the common reasons organizations resist upgrading their B2B platform and find out the steps you can take to modernize your B2B platform.
Posted: 16 Oct 2015 | Premiered: May 1, 2015

IBM

Don't Get Taken for a Ride: Finding the Right Hyperconverged Solution
sponsored by HPE and Intel®
VIDEO: Tune into this video to find out how implementing a hyperconverged system in your data center can simplify and speed your IT infrastructure while lowering costs and accelerating the pace of your business. View now to use HCI to quickly add capacity to your infrastructure, and manage the rollercoaster of demands in today's digital economy.
Posted: 23 Jun 2016 | Premiered: 30 May 2016

HPE and Intel®

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Solving Your Top 3 Archiving Challenges: Compliance, Cost, and Risk
sponsored by Proofpoint, Inc.
WEBCAST: Aging archiving systems were not built to store emails, social media records, and other modern digital files. View this webcast to ensure that your enterprise is compliant with the latest e-discovery laws and learn how to properly archive electronically stored information in the cloud.
Posted: 09 Jun 2016 | Premiered: Jun 9, 2016

Proofpoint, Inc.

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Meet the Experts! Special Edition: Get a Handle on Your Sales Issues
sponsored by Microsoft
WEBCAST: In this webinar, Barry Trailer, Co-founder of CSO Insights research firm, will help address your top sales barriers. Discover several proven methods to capture new accounts and optimize lead generation.
Posted: 03 Mar 2016 | Premiered: Mar 3, 2016

Microsoft

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Expert guidance for DCIM: Data Center Information Management Solutions
sponsored by Schneider Electric
PODCAST: How can you ensure that your DCIM implementation will be a success? Tune into this podcast to discover how you can avoid the common pitfalls of DCIM software implementation and ensure the success of your DCIM strategy, and learn how to leverage scalable, modular architecture with strong vendor support.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Elevate's CISO Explains Why He Chose Masergy Managed Security
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service that one managed security provider was showing. Watch this 2 minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Everything as a Service: Improve Workflow in All Departments
sponsored by ServiceNow
VIDEO: In this brief video, learn how you can leverage Everything as a Service to enable automation and efficiency across your organization. Discover how to deliver everything from employee onboarding, to invoicing, to cloud provisioning as a service.
Posted: 23 Feb 2016 | Premiered: 29 Apr 2015

ServiceNow

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Cloud-Powered Integrated Systems: Engineered for Innovation
sponsored by Oracle, in association with Intel
VIDEO: In this video, you will discover what differentiates Oracle Engineered Systems' portfolio from other integrated systems, learn how this infrastructure can help reduce your IT complexity and accelerate the pace of innovation to improve competitive edge. Tune in now to integrate every enterprise workload into one manageable system.
Posted: 01 Mar 2016 | Premiered: 22 Dec 2014

Oracle, in association with Intel

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ITS White Papers | ITS Multimedia | ITS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement