IT Management  >   Systems Operations  >   Networking  >  

P2P

RSS Feed    Add to Google    Add to My Yahoo!
P2P Multimedia (View All Report Types)
 
Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Case Study: Cloud Automation for Straightforward Cloud-Enablement
sponsored by Embotics
VIDEO: Cloud automation enables employees to focus on more complex and involved tasks while better serving the rest of the enterprise. Watch this 2 minute video to learn about a straightforward path to cloud-enablement and see the benefits one IaaS provider realized by installing cloud automation.
Posted: 28 Oct 2016 | Premiered: 28 Oct 2014

Embotics

Hightail Chooses IBM for Storage That Grows With Its Data
sponsored by IBM
WEBCAST: Learn how Hightail reduced costs, increased storage and cut power consumption by 30% with IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Making the Case for Automation
sponsored by Embotics
WEBCAST: As the virtualization infrastructures' scale increases, so too does the difficulty of management. Traditional management techniques can be rendered completely ineffective by virtual data center growth, leading to uncontrolled virtual machine sprawl and wasted hardware resources. Automation may be able to solve these issues. Tune in to learn more.
Posted: 23 Aug 2016 | Premiered: Jun 8, 2016

Embotics

Discover a Cost-Effective Alternative to Traditional Storage
sponsored by IBM
WEBCAST: Are you challenged by storing large volumes of unstructured data? Look past traditional solutions for a new approach.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Designing an Adaptive Security Architecture
sponsored by Intel Security
WEBCAST: Advanced attacks bypass blocking and prevention strategies. Implement an adaptive security architecture for protection.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Intrusion Prevention Systems Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
P2P White Papers | P2P Multimedia | P2P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement