Business of Information Technology  >   Business Management  >   Risk Management  >  

Industrial Safety

RSS Feed    Add to Google    Add to My Yahoo!
Industrial Safety Multimedia (View All Report Types)
 
Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Understand Cloud ERP
sponsored by IFS
WEBCAST: This on-demand webcast dispels the confusion surrounding cloud enterprise resource planning (ERP). Inside, find out how cloud ERP works, uncover the key benefits it can offer your organization, learn about executive perceptions and misconceptions, and more.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

2013 Cost of Cyber Crime – UK, France and Germany Findings
sponsored by Hewlett-Packard Enterprise
WEBCAST: Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

Hewlett-Packard Enterprise

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Transforming Into Senior Digital Business Executives
sponsored by Gartner
WEBCAST: Tune in to this informative webcast to learn how you can make the most out of your role as CIO or IT manager and refocus your efforts on adding real business value to you enterprise. Click on the link and stream this informative webcast from the experts at Gartner to find out more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014

Gartner

Big Data Analytics, Business Processes and Application Performance Management: A Business Manager's Perspective
sponsored by CA Technologies.
WEBCAST: This webcast addresses the need for IT organizations to adopt a business manager's approach to Big Data analytics to manage the ocean of data from business transactions and badly performing apps.
Posted: 04 Jun 2014 | Premiered: Nov 21, 2013

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement