IT Agents  >   Industry Organizations  >   Internet Industry Organizations  >  

Internet Industry Association

RSS Feed    Add to Google    Add to My Yahoo!
Internet Industry Association Multimedia (View All Report Types)
 
How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

Secure, Scalable Content Collaboration
sponsored by IBM
VIDEO: This short video highlights how a CIO of a national leading bank improved critical steps of a loan application process to ensure sensitive customer information and documents are being handled in the best way. Gain ideas on how you can improve your content management processes to keep important information secure and help improve customer service.
Posted: 27 Jul 2016 | Premiered: 17 Mar 2016

IBM

Rapid Deployment of T-Systems’ Strategic Modular Data Center
sponsored by Emerson
VIDEO: In this concise time-lapse video, see first-hand, the modular solution for rapidly deploying a new strategic data center for cloud services. Raúl Saura, head of Dynamic Platform Services at T-Systems Iberia, tells you more about the process and his partnership with the construction of the new data center.
Posted: 14 Sep 2016 | Premiered: 27 Jan 2015

Emerson

Can Secure Text Messaging Improve Communications Efficiency in Healthcare?
sponsored by Imprivata
WEBCAST: Healthcare IT leaders discuss the value of secure text messaging as an alternative to pagers to improve communications efficiency and provider productivity. View now to learn how you can leverage texting to eliminate inefficiencies and accelerate patient care.
Posted: 28 Mar 2016 | Premiered: Jul 9, 2014

Imprivata

Healthcare Content Management: Eliminate Data Silos
sponsored by Lexmark Healthcare
VIDEO: Discover how to give your clinicians complete access to patient information within your EHR by eliminating silos and uniting content across the healthcare organization, delivering consistent viewing experience across devices, and more.
Posted: 16 Jun 2016 | Premiered: 16 Jun 2016

Lexmark Healthcare

Why Software-Defined Storage Matters
sponsored by Red Hat
WEBCAST: Data growth is quickly outpacing IT storage budgets, causing market leaders to look for efficient and cost effective storage solutions. This webcast explains how to deal with today's data explosion by implementing software-defined storage (SDS) at your enterprise. View now to learn about SDS and its multitude of cost saving features.
Posted: 01 Sep 2016 | Premiered: Feb 17, 2016

Red Hat

How the HC380 is Changing the Hyper-Converged Market
sponsored by NTT ICT
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 06 Sep 2016 | Premiered: 16 Mar 2016

NTT ICT

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Case Study: Online Bank Relies on Cloud for Product Rollout
sponsored by Dimension Data
VIDEO: In this video, learn how banking giant ING Direct - a wholly online bank - was able to speed up the automation of services rollout without affecting the customer experience.
Posted: 02 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

EMC DSSD Rack-Scale Flash Overview
sponsored by Dell EMC
VIDEO: Next-gen applications that take advantage of today's data growth are often too intensive for existing storage architectures. This video details a new storage platform that overcomes the limitations of direct-attached PCIe flash and all flash arrays by connecting ultra-fast, shared flash to rack-servers using the lowest latency protocols.
Posted: 21 Sep 2016 | Premiered: 29 Feb 2016

Dell EMC

Gatwick Airport Drives Security Efficiency with SIM Cloud Platform
sponsored by Splunk
WEBCAST: Tune into this on-demand webinar now to discover how Gatwick utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Splunk

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

What If an Invisible Attacker Tried to Bring Down Your Business?
sponsored by Lenovo
PODCAST: In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.
Posted: 10 Aug 2016 | Premiered: Aug 10, 2016

Lenovo

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Cyberattacks that Transcend the Digital World
sponsored by OpenDNS
PODCAST: This informative podcast takes a look at the vast, interconnected systems supporting our daily life. How at risk are the industrial systems behind the light switch on your wall, the water out of your tap? Find out now.
Posted: 02 Sep 2016 | Premiered: Aug 1, 2016

OpenDNS

How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Maximize the Benefits of Containers and Meet Cloud Challenges Head-on
sponsored by Red Hat
VIDEO: In this webcast, industry analyst Dave Bartoletti discusses how enterprises are using containers today and examines a broad range of relevant app use cases. Tune in now to learn more about the challenges of container adoption and discover for which workloads containers are best used.
Posted: 13 Jul 2016 | Premiered: 24 Apr 2015

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement