IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

PKE

RSS Feed    Add to Google    Add to My Yahoo!
PKE Multimedia (View All Report Types)
 
Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which security strategies are most effective at dealing with today's dangerous array of cyber-threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
sponsored by Schneider Electric
PODCAST: Tune into this podcast to discover how you can avoid 3 common pitfalls for DCIM software implementation. Access now to gain practical guidance for how to ensure the success of your DCIM strategy.
Posted: 09 May 2016 | Premiered: May 9, 2016

Schneider Electric

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

Safeway Gains Visibility and Context into Attacks With Behavior Intelligence
sponsored by Exabeam
VIDEO: User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam

Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software
sponsored by Commvault
VIDEO: Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.
Posted: 09 May 2016 | Premiered: 16 Oct 2015

Commvault

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
PODCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 18 May 2016 | Premiered: Apr 18, 2016

Equinix

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

What mobile policy suits your organisation?
sponsored by IBM MaaS360
WEBCAST: Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKE White Papers | PKE Multimedia | PKE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement