IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

PDD 63

RSS Feed    Add to Google    Add to My Yahoo!
PDD 63Multimedia (View All Report Types)
 
How is the "IT" in ITSM disappearing?
sponsored by FrontRange Solutions Inc.
VIDEO: Why is the 'IT' in ITSM disappearing before our eyes? This video introduces a solution that paves the way for automation-based service management throughout the enterprise.
Posted: 22 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

Top 10 Strategic Technologies Trends for 2014
sponsored by Gartner
WEBCAST: Watch this Gartner presentation recorded live at Gartner Symposium/ITxpo to learn about 2014 industry trends, and how you, as a CIO or IT manager, can take advantage and leverage these trends to revolutionize your operation and organization as a whole. Tune in now to learn more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014, 01:01 EDT (05:01 GMT)

Gartner

Rocket Software: Predictive & Proactive IT and Data Protection Management
sponsored by IBM
WEBCAST: Watch this video to find out how one solution is helping organizations proactively manage heterogeneous and complete IT, storage and data protection infrastructures. Prevent outages and failures with predictive capabilities like real-time content and alerts.
Posted: 25 Aug 2014 | Premiered: Feb 12, 2014

IBM

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
PODCAST: Tune in to this informative podcast to gain crucial information about managed security solutions, and how they can help you monitor threats and prevent data breaches in your enterprise.
Posted: 13 Aug 2014 | Premiered: Aug 5, 2014

NEC Corporation of America

A Case for Pager Replacement Presented by Dr. Larry Ponemon
sponsored by Imprivata
WEBCAST: Discover how communication inefficiencies can severely impact the healthcare industry, and how implementing a new, mobile communication technique can result in cost savings over time.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Imprivata

Security School: Defending Against DDoS Attacks
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.
Posted: 15 Aug 2014 | Premiered: 15 Aug 2014

SearchSecurity.com

Storage Solution Case Study: BMO Harris Bank Saves $5 Million Per Year
sponsored by EMC Corporation
WEBCAST: This video explains how BMO Harris Bank found a storage solution with easy access that provided them with immediate savings of $5 million a year. Watch to find out how you can deploy the same solution with an easy to use interface and quickly lower costs.
Posted: 29 Jul 2014 | Premiered: Jul 29, 2014

EMC Corporation

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Cloud Breaks IT: How a Broker Platform Can Help IT Harness the Power of Cloud
sponsored by Gravitant
WEBCAST: This exclusive webcast details how the cloud is not as easy, fast and cheap as people assume and offers cloud service brokerage as an important tool.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Gravitant

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement