Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational and Environmental Safety

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Environmental Safety, Industrial Safety, Environmental Health, Occupational Health
DEFINITION: The prevention and investigation of occupationally related injuries and health matters. Also includes environmental problems.
Occupational and Environmental Safety Multimedia (View All Report Types)
26 - 50 of 172 Matches Previous Page  |  Next Page
Data Access Governance Solutions On-Demand Demo
sponsored by STEALTHbits
WEBCAST: This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.
Posted: 14 Sep 2016 | Premiered: Dec 31, 2015

STEALTHbits

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Gain Visibility and Context into Attacks with Behavior Intelligence
sponsored by Exabeam
VIDEO: It's imperative today to deal with the myriad of threats that organizations deal with daily. Learn how to accelerate your time to attack understanding, reduce response time and create a more efficient security operation.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam

How Hulu Solves Their Security Analytics Problem
sponsored by Exabeam
VIDEO: Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.
Posted: 20 May 2016 | Premiered: 23 Sep 2015

Exabeam

How to Avoid the Illusion of Your Corporate Network
sponsored by Above Security
WEBCAST: This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.
Posted: 22 Aug 2016 | Premiered: Jul 1, 2016

Above Security

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
sponsored by EnterpriseDB Corporation
WEBCAST: Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)

EnterpriseDB Corporation

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Ensuring VoIP Quality of Service
sponsored by SUSE
WEBCAST: Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
Posted: 09 Aug 2006 | Premiered: May 24, 2006

SUSE

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
sponsored by SAP AG
VIDEO: Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
Posted: 17 Sep 2010 | Premiered: 17 Sep 2010

SAP AG

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Getting started in Software Asset Management
sponsored by Centennial Software
WEBCAST: Listen to this Webcast to hear Forrester's Evelyn Hubbert discuss SAM benefits, the specific technologies involved in deploying SAM and how it can help your organization ensure security and compliance.
Posted: 11 Oct 2007 | Premiered: Oct 2, 2007, 11:00 EDT (15:00 GMT)

Centennial Software

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation
26 - 50 of 172 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement