IT Agents  >   Standards Organizations  >   National Standards Organizations  >  

International Standards Organization

RSS Feed    Add to Google    Add to My Yahoo!
International Standards Organization Multimedia (View All Report Types)
 
Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Best Practices For Strengthening Your Sales Analytics
sponsored by Qlik
WEBCAST: Access this webcast to learn new sales analytics software capabilities and potential benefits for your company.
Posted: 07 May 2015 | Premiered: May 6, 2015

Qlik

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Cloudant NoSQL DB
sponsored by IBM
SOFTWARE DOWNLOAD: Discover how Cloudant's NoSQL database can give your organization access to a fully managed NoSQL JSON Data layer that's always available. Test out this software to learn how you can get a fast flexible easily manageable data base for top notch analytics.
Posted: 30 Apr 2015 | Premiered: 30 Apr 2015

IBM

Simplifying Data at Rest Encryption and Security
sponsored by WinMagic
WEBCAST: This webcast explores full-disk encryption and how it can simplify securing data at rest as well as access management and network security.
Posted: 29 Jun 2015 | Premiered: Jun 10, 2015

WinMagic

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Webcast -The Business Value of Creating Exceptional Digital Experiences-Findings from IDC
sponsored by IBM
WEBCAST: Tune into the following webcast to hear from Melissa Webster, Program Vice President of Content and Digital Media Technologies for IDC and Anthony Fiorot, WW Portals and Digital Experience Solution Sales Leader for IBM Software Group as they review the findings of IDC's recent analytical report on delivering exceptional customer experiences.
Posted: 16 Sep 2014 | Premiered: Sep 16, 2014

IBM

Actian Video - Interview with Sean Anderson
sponsored by Rackspace
VIDEO: View this brief video to learn about new offerings from a managed cloud provider based around the Apache Hadoop technology. Additionally, see how two IT organizations collaborated to create an SQL relational database management system designed for high performance in analytical database applications.
Posted: 25 Sep 2014 | Premiered: 29 Oct 2013

Rackspace

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Flip Security and Compliance from a Problem to Competitive Advantage
sponsored by 8x8, Inc.
WEBCAST: This webinar highlights the adverse effects of non-compliance on your organization. Discover how much you'll gain by using a secure, compliant approach guaranteed to meet your requirements
Posted: 23 Jun 2015 | Premiered: Jun 23, 2015

8x8, Inc.

Standardizing with Linux for Increased Datacenter Efficiency
sponsored by Red Hat
VIDEO: Watch this webinar and learn more about 5 major transformative areas that can make IT operations more efficient.
Posted: 04 Aug 2014 | Premiered: 04 Aug 2014

Red Hat

Case Study: International Bank Revolutionizes Its Data Center
sponsored by VCE
VIDEO: In this video, discover how an international bank revolutionized the services its IT could deliver by revamping its data center.
Posted: 27 Apr 2015 | Premiered: 27 Apr 2015

VCE

What If You Could Innovate and Grow Without Taking A Big Risk?
sponsored by Red Hat
VIDEO: This video explains why leading organizations are turning to Linux to help modernize, standardize, and virtualize their infrastructure for huge gains in performance and management.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP
sponsored by Hewlett-Packard Limited
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Network Security from the Inside: Understanding the New Model of Firewall
sponsored by Fortinet, Inc.
WEBCAST: This 90-second whiteboard video illustrates how an internal network firewall (INFW) defends data from inside the network. Watch now to uncover the three critical criteria an INFW needs to meet to ensure network security.
Posted: 05 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

Bridges Insights: Ulrich Marte of P&G
sponsored by GT Nexus
VIDEO: Watch this brief testimonial from Ulrich Marte, international trade/global program manager of P&G about how their organization were able to employ cloud-based control towers for end-to-end visibility in their global supply chain.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

GT Nexus

The CRM and WCM Story
sponsored by Rackspace
VIDEO: Find out what changes a digital systems integrator organization made to ensure their customers' mission-critical systems are always up and running.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

Rackspace

Vblock Specialized System for SAP HANA
sponsored by VCE
VIDEO: In this short video, discover what third-party providers are doing to help enterprises make the most out of the move to SAP HANA. By bringing together all of the necessary components for SAP HANA into a single, standardized converged infrastructure system, third-parties aim to ensure maximum performance at scale even with high data volumes.
Posted: 11 Apr 2013 | Premiered: 21 Feb 2013

VCE

Mobile Communications: How to Make Governance Work
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this web seminar, learn to develop data management techniques that successfully align information governance best practices with your organization's mobile communications strategy.
Posted: 09 Jun 2014 | Premiered: 10 Jun 2014

SearchCompliance.com

Identity and Access Management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom covers need-to-know information about identity and access management, including best practices as well as some new tools to help manage your IAM strategy.
Posted: 30 Apr 2015 | Premiered: 29 Apr 2015

SearchSecurity.com

Protection Against the Three Vectors of a Healthcare Cyberattack
sponsored by Fortinet, Inc.
WEBCAST: In this webinar, examine the top security threats and vulnerabilities facing healthcare today as well as strategies to overcome these challenges.
Posted: 12 Jun 2015 | Premiered: Jun 3, 2015

Fortinet, Inc.

Overcome the Challenges Associated With New Technologies
sponsored by Peer1
VIDEO: This video highlights several challenges IT leaders face when adopting new technologies.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Collaborative report production management with CDM
sponsored by IBM
VIDEO: This webcast will show you how collaborative report production management can help you escape the manual approach to report processing, increasing productivity while still retaining the security of sensitive documents.
Posted: 05 Nov 2013 | Premiered: 05 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement