IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

PKE

RSS Feed    Add to Google    Add to My Yahoo!
PKE Multimedia (View All Report Types)
 
Top 10 Emerging Trends and Their Impact on Your IT Operation
sponsored by Gartner
WEBCAST: In this exclusive presentation, David Cappuccio, VP Distinguished Analyst at Gartner, highlights the top 10 emerging technology trends and examines their impact on your IT infrastructure and operations. Tune in to see which trends you should keep an eye on, including edge computing, bimodal IT, and more.
Posted: 15 Apr 2016 | Premiered: Dec 31, 2015

Gartner

3 Simple Ways to Outsmart Your Storage
sponsored by IBM
VIDEO: This short webcast highlights a software-defined storage solution that improves data security with encryption capabilities, simplifies data management, and enhances overall data value. Watch now to see how you can improve your existing storage infrastructures and better manage higher data volumes.
Posted: 09 Mar 2016 | Premiered: 04 Nov 2015

IBM

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Stop Running Around for IT
sponsored by Dell, Inc. and Intel®
VIDEO: This humorous video shows how one IT guy made his job more efficient with cloud client solutions from Dell, Citrix, and Intel technologies. Watch now and you'll learn how this combination of technologies allowed him to simplify desktop management and improve security capabilities.
Posted: 20 Jan 2016 | Premiered: 20 Jan 2016

Dell, Inc. and Intel®

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Customer Stories: "No Limits" Data Protection
sponsored by Hewlett Packard Enterprise
VIDEO: In this brief webcast, hear from real customers – your peers – as they discuss HPE's data protection solution and its benefits. Watch now to see how you can increase the scalability, efficiency, and affordability of your data protection strategy.
Posted: 22 Jan 2016 | Premiered: 01 Dec 2015

Hewlett Packard Enterprise

Expanding Your Collaborative Infrastructure to the Cloud
sponsored by IBM
VIDEO: Learn how you can transform collaborative efforts by leveraging the cloud. Explore ways to provide strategies that expand your infrastructure to deliver results with your existing enterprise content management (ECM) solutions.
Posted: 23 Mar 2016 | Premiered: 02 Nov 2015

IBM

Cloud-Powered Integrated Systems: Engineered for Innovation
sponsored by Oracle, in association with Intel
VIDEO: In this video, you will discover what differentiates Oracle Engineered Systems' portfolio from other integrated systems, learn how this infrastructure can help reduce your IT complexity and accelerate the pace of innovation to improve competitive edge. Tune in now to integrate every enterprise workload into one manageable system.
Posted: 01 Mar 2016 | Premiered: 22 Dec 2014

Oracle, in association with Intel

ITSM Drives Digital Transformation at the NHS Education for Scotland
sponsored by ServiceNow
VIDEO: In this brief video, Christopher Wroath, Interim Director of Digital Transformation, explains why not changing to a service management culture is not an option at the NHS Education for Scotland. Uncover how this enables them to demonstrate a properly integrated service-led experience for trainees.
Posted: 02 Mar 2016 | Premiered: 05 Nov 2015

ServiceNow

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement