Business of Information Technology  >   Business Management  >   Risk Management  >  

Occupational and Environmental Safety

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Environmental Safety, Industrial Safety, Environmental Health, Occupational Health
DEFINITION: The prevention and investigation of occupationally related injuries and health matters. Also includes environmental problems.
Occupational and Environmental SafetyMultimedia (View All Report Types)
26 - 50 of 156 Matches Previous Page  | Next Page
Demo: Easy-to-use OpenIAM Identity and Access Management
sponsored by OpenIAM
WEBCAST: View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities
Posted: 18 Mar 2014 | Premiered: Mar 9, 2014

OpenIAM

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Gain Operational Insight with VMware Cloud Operations Management Solutions
sponsored by VMware, Inc.
WEBCAST: This on-demand webcast details VMware's cloud management strategy and explores how you can automate operations management.
Posted: 26 Feb 2014 | Premiered: Dec 31, 2013

VMware, Inc.

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

How Business Analysis is essential for agile success
sponsored by IBM
WEBCAST: There are many myths surrounding the role of business analysis when it comes to Agile projects. Is it really necessary for Agile success? In this comprehensive webcast, you'll hear from business analysis expert Mary Gorman from EBG Consulting, as she covers the myths and actualities of business analysis for Agile projects.
Posted: 06 Nov 2013 | Premiered: Dec 31, 2012

IBM

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation
sponsored by AlienVault
WEBCAST: This in-depth webinar explores the current threat landscape, SQL injection and XSS attacks and what you can do to stop them.
Posted: 04 Mar 2014 | Premiered: Feb 25, 2014

AlienVault

How to Steal 60 Million Dollars in 60 Seconds
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.
Posted: 11 Feb 2014 | Premiered: Dec 16, 2013

Hewlett-Packard Limited

How to Stop Online Payment Fraud Without Adding Friction
sponsored by ThreatMetrix
WEBCAST: This in-depth webcast explores many current methods used to detect online payment fraud in real-time and how you can be more transparent for your customers.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2014

ThreatMetrix

HP and United: Teaming together for a successful migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief video case study, learn how United Airlines achieved a quick IT migration of a large size and scale – all without impact from a technology perspective.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
sponsored by EnterpriseDB Corporation
WEBCAST: Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)

EnterpriseDB Corporation

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Ensuring VoIP Quality of Service
sponsored by SUSE
WEBCAST: Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
Posted: 09 Aug 2006 | Premiered: May 24, 2006

SUSE

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
sponsored by SAP AG
VIDEO: Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
Posted: 17 Sep 2010 | Premiered: 17 Sep 2010

SAP AG

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Getting started in Software Asset Management
sponsored by Centennial Software
WEBCAST: Listen to this Webcast to hear Forrester's Evelyn Hubbert discuss SAM benefits, the specific technologies involved in deploying SAM and how it can help your organization ensure security and compliance.
Posted: 11 Oct 2007 | Premiered: Oct 2, 2007, 11:00 EDT (15:00 GMT)

Centennial Software

Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks
sponsored by Proofpoint, Inc.
WEBCAST: For all healthcare providers, properly secured email and other web 2.0 tools help lower costs while improving service delivery. But failing to protect patient data or meet regulatory requirements could mean large fines and strict penalties. Watch this webcast to uncover the top 5 messaging and collaboration risks.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

Proofpoint, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z®
sponsored by IBM
WEBCAST: In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business.
Posted: 09 Feb 2011 | Premiered: Mar 1, 2011, 11:00 EST (16:00 GMT)

IBM
26 - 50 of 156 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement