IT Management  >   Systems Operations  >  

Information Technology Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Auditing Multimedia (View All Report Types)
Centennial Discovery 2007
sponsored by FrontRange Solutions Inc
TRIAL SOFTWARE: Centennial Discovery is an award-winning IT Audit and Inventory management solution designed to improve IT governance by enabling customers to more effectively plan, manage and report on various IT operational disciplines
Posted: 01 Apr 2008 | Premiered: 01 Apr 2008

FrontRange Solutions Inc

Webinar: Getting Hadoop Through an IT Audit
sponsored by WANdisco
WEBCAST: Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
Posted: 08 May 2014 | Premiered: May 8, 2014


Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett-Packard Company
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Why a Bi-Modal Approach to Cloud Infrastructure Strategy Can Benefit Your Organization
sponsored by Dell, Inc.
VIDEO: This video discusses the use of a bimodal approach to IT when implementing a cloud infrastructure strategy, where the first mode focuses on alignment to the business and the second focuses on desires of technical end users. Watch to see how building a cloud competency center for this approach can guide your enterprise through this transformation.
Posted: 01 Oct 2015 | Premiered: 01 Oct 2015

Dell, Inc.

Next-Level Authentication: Intelligent Location-Based Strategies
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014


Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

ASG- Perfman: Health Insurance Provider
sponsored by ASG
VIDEO: This video examines how a major healthcare provider was able to vastly improve their ability to analyze and react to short-term and historical data by deploying Perfman.
Posted: 21 Aug 2015 | Premiered: 21 Aug 2015


Streamline Your IT Systems Management
sponsored by Dell, Inc. and Intel®
VIDEO: This brief video explains how you can gain the network visibility you need to keep your IT environment running smoothly.
Posted: 28 Sep 2015 | Premiered: 09 Sep 2015

Dell, Inc. and Intel®

Trends in Converged Infrastructure Management
sponsored by CA Technologies.
WEBCAST: This exclusive webcast covers the results of a survey of top IT decision makers that reveals the emerging priorities of IT, the challenges facing IT and much more.
Posted: 19 May 2014 | Premiered: May 19, 2014

CA Technologies.

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015


Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Meet N-able Security Manager
sponsored by Solarwinds N-able
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

Solarwinds N-able

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015


The New Style of Business
sponsored by Hewlett-Packard Company
WEBCAST: This short webcast highlights some of the biggest technologies that are affecting businesses today, and what they mean for the role of IT.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett-Packard Company

IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013


SQL Compliance Manager – Download Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Acquiring a top-notch compliance management system for SQL Server is no easy task. Fortunately, we can help. Uncover the ins-and-outs of SQL Compliance Manager – and get your hands on a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


At the Heart of Cardiovascular Care: Leveraging IT to Help Enhance Patient Care
sponsored by GE Healthcare
WEBCAST: In this video, medical experts discuss the role of IT in cardiovascular care as an enabler of medicine in terms of patient management, cost containment, workflow, best practices, and reporting. They address the challenges IT faces as well as their future goals.
Posted: 06 Apr 2015 | Premiered: Feb 25, 2015

GE Healthcare

Modern Infrastructure University: ITSM/ IT Management
sponsored by SearchCIO
VIRTUAL ENVIRONMENT: In this exclusive classroom session, ITSM expert Derek Lonsdale of PA Consulting clears up the confusion between asset and configuration management, offering best practices; meanwhile, CIO Niel Nickolaisen promotes the need for ITSM principles and how to achieve them.
Posted: 14 Feb 2014 | Premiered: 20 Feb 2014


Leverage Static Analysis in Automotive Functional Safety
sponsored by Rogue Wave Software
WEBCAST: This webinar explores how static code analysis can be used as a real contributor to functional safety, rather than just deployed as a means of ticking another box during an audit.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

On-Demand Webinar: Driving IT Innovation in the Enterprise
sponsored by Mendix
WEBCAST: According to Michael Krigsman, meeting app delivery demand starts by putting the right competencies, processes and technologies in place. Watch this interactive discussion for insight into how your team—and organization—can adapt and thrive in the digital era.
Posted: 24 Jul 2015 | Premiered: Jul 24, 2015


Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013


What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: Watch this video to see Brian Madden deal with updating desktop servers which result in none of the updated computers having the same image deployment. Find out how application virtualization solutions that don't include image deployment can be an ambitious task for IT pros to handle.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.

Bolstering Your Mobile Mojo: The Current State of Enterprise Mobility
sponsored by IBM
WEBCAST: Keeping up with the age of mobile can be difficult but this webcast will help you get connected with one enterprise cloud solution for your organization's mobile device management (MDM). Get access to the benefits of your business working in the cloud.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security intelligence strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014


Multiple Device types, One Integrated Strategy
sponsored by Dell, Inc.
WEBCAST: Join two experts in the field of endpoint and mobility management as they explore details on how to manage mobile devices in organizational settings. Access this webinar and you'll also find a demo on enterprise mobility management systems.
Posted: 02 Oct 2015 | Premiered: Oct 2, 2015

Dell, Inc.

Updated Machine Data Platform Offers Improved Performance
sponsored by Splunk
WEBCAST: This webcast explores a machine data platform that allows organizations to search, navigate, and interact with data that is generated in real time. Watch now to learn more about how all of your data can not only become available and useful, but also how it can be protected with this data platform.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015


Systems of Engagement: The Future of Enterprise IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, Forrester Research Vice President and Principal Analyst John McCarthy describes how systems of engagement are shaping the future of enterprise IT. Tune in to learn more today.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

TOPS-HP Video Case Study: IT Infrastructure Migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video case study, learn how the right technology partner enabled grocery store retailer TOPS Markets to seamlessly migrate its IT infrastructure during the busy retail season. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2010

Hewlett-Packard Limited
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement