Vertical Industries  >  

Internet Vacation Industry

RSS Feed    Add to Google    Add to My Yahoo!
Internet Vacation Industry Multimedia (View All Report Types)
 
Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

How Well Do You Know Your Customers?
sponsored by BAE Systems
WEBCAST: This webcast explores how KYC and anti-money laundering (AML) technology fit into your institution by viewing the organization in terms of a financial crime and risk management framework. Discover how to go beyond initial customer onboarding to implement ongoing risk management.
Posted: 07 Mar 2017 | Premiered: Mar 7, 2017

BAE Systems

Streamline Data Center Maintenance with Multivendor Technology Support
sponsored by IBM
VIDEO: Here's how to realize proactive multi-vendor IT support: Watch this video to streamline maintenance support for hardware, software, and your multiple vendor relationships with a single point of contact. Discover a technical appliance purpose-built for your heterogeneous data center environment.
Posted: 28 Mar 2017 | Premiered: 18 Jan 2016

IBM

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

Recorded Future for Splunk Enterprise Security (ES)
sponsored by Recorded Future
WEBCAST: Explore how to use real-time threat intelligence to dramatically increase your organization's speed to avoid false positives and rapidly understand true incidents in context.
Posted: 06 Mar 2017 | Premiered: Nov 18, 2016

Recorded Future

Why Threat Intelligence Matters to your Organization
sponsored by Recorded Future
WEBCAST: Gain an expert's viewpoint on what threat intelligence is, how it works and why it matters. Uncover how you can keep your information security teams stay ahead of cyberattacks.
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

What Does Real-Time Threat Intelligence Enable?
sponsored by Recorded Future
WEBCAST: Discover how real-time threat intelligence empowers organizations to develop a proactive cyber security posture and helps to answer questions like, "When will I, or have I been, attacked?" and "How did the adversary breach the organization?"
Posted: 06 Mar 2017 | Premiered: Mar 6, 2017

Recorded Future

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID
WEBCAST: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


Your In-Depth Guide to GDPR
sponsored by Oracle Corporation UK Ltd
WEBCAST: Gain an overview of what the key objectives of the general data protection regulation (GDPR) are, what it means for your organization, and what impact it will have on your business.
Posted: 13 Apr 2017 | Premiered: Apr 11, 2017

Oracle Corporation UK Ltd

Log Management and Analytics: Your Guide
sponsored by Logentries
WEBCAST: Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.
Posted: 19 Apr 2017 | Premiered: Apr 13, 2017

Logentries

The Future of Privileged Management: Understanding the Bigger Picture
sponsored by One Identity
VIDEO: Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.
Posted: 16 Mar 2017 | Premiered: 08 Dec 2016

One Identity

Vidant Health's New Threat Analytics Program: More Than The Sum of Its Parts
sponsored by McAfee, Inc.
WEBCAST: Inside this case study, learn how Vidant Health, the largest healthcare provider in North Carolina made delayed security reporting and conflicting APIs a thing of the past with their new threat analytics program.
Posted: 12 Apr 2017 | Premiered: Apr 12, 2017

McAfee, Inc.

The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Stay on top of the current cybersecurity landscape and join us for this live virtual conference on June 27th.
Posted: 24 Apr 2017 | Premiered: 24 Apr 2017

SearchSecurity.com

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

Path To the Cloud: Strategies for Building Open Cloud Enabled Infrastructure
sponsored by Oracle Corporation UK Ltd
VIDEO: In this webcast, watch as industry expert Robert Shimp explores how, with cloud at the core of your data center you can begin a whole new way of managing your IT. Discover how IoT adoption, the advent of 'cloudlets' containerization, and more can all have a positive impact on your business when put to good use.
Posted: 07 Mar 2017 | Premiered: 18 Jan 2017

Oracle Corporation UK Ltd

Optimize Your IT Infrastructure with Hyper-Convergence
sponsored by Pivot3
VIDEO: Outdated, legacy architectures simply can't deliver the performance necessary to run the high-demand apps your business relies on. Learn how you can use hyper-convergence to achieve better capacity utilization, higher compute efficiency, lower IT costs, and more.
Posted: 17 Jun 2016 | Premiered: 17 Jun 2016

Pivot3

Partners help Dell enable OpenStack for all
sponsored by Red Hat
VIDEO: This webcast covers what you need to know about how OpenStack is being used with cloud computing and how to utilize it in the years to come.Learn about the industry's largest known network function virtualization (NFV) OpenStack cloud deployment across 5 significant U.S. datacenters.
Posted: 20 Mar 2017 | Premiered: 15 Jul 2016

Red Hat

The Internet of Things: Make It Real in Your Enterprise
sponsored by vmware airwatch
WEBCAST: Learn how to help drive and enable IoT use cases in your organization, and how the convergence of EMM and IoT provides broader control and visibility over connected devices for smarter, real-time operational decisions.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Webcast: Thinking Strategically About ABM
sponsored by TechTarget and Marketo
WEBCAST: Industry leaders TechTarget and Marketo outline the most common challenges of Account-Based Marketing (ABM) strategies and a set of practical practices for 2017.
Posted: 29 Mar 2017 | Premiered: Mar 29, 2017

TechTarget and Marketo

Eisenhower Medical Center completes complete data center move
sponsored by HP
WEBCAST: Data centers are a complex and critical part of today’s business infrastructure, usually built up over a period of time. But what happens when you have to move an entire data center at once? This resource presents key points when moving a data center.
Posted: 10 Nov 2011 | Premiered: Nov 10, 2011

HP

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement