IT Management  >   Systems Design and Development  >   IT Infrastructure  >   Security Infrastructure  >  

PKI

RSS Feed    Add to Google    Add to My Yahoo!
PKI Multimedia (View All Report Types)
 
Securing BYOD without MDM
sponsored by BitGlass
WEBCAST: Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Posted: 28 Nov 2016 | Premiered: Nov 28, 2016

BitGlass

Hyperconverged Infrastructure: Don't Be Taken for a Ride!
sponsored by Hewlett Packard Enterprise
VIDEO: This video offers a hyper-converged solution that allows you to standardize on simplicity, provision on VM easily, add capacity quickly and affordably. See how this solution is accessible and manageable on a device that you are familiar with, wherever that may be.
Posted: 07 Dec 2016 | Premiered: 01 Nov 2016

Hewlett Packard Enterprise

Solve Petabyte-and-Beyond Storage Challenges
sponsored by IBM
WEBCAST: Learn how the IBM Cloud Object Storage System provides scalability, security, flexibility and lower TCO.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

A Solutions Approach to Web-Scale Storage
sponsored by IBM
WEBCAST: IDC predicts companies will face up to 80% annual growth in unstructured data. Avoid costly storage services with IBM.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

Gain Speed and Grow Faster with the Cloud
sponsored by IBM
WEBCAST: Simplify your B2B integration strategy with the cloud to improve collaboration with suppliers and customers.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

IT at Intel: Information Sharing
sponsored by Intel Security
WEBCAST: Hear from Intel's IT Information Security department on their evolution of threat intelligence and information sharing.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Intel Security GM Outlines a New Model for Cybersecurity
sponsored by Intel Security
WEBCAST: We face substantial security challenges that continue to grow. Hear from Chris Young on the new model for cybersecurity.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
PKI White Papers | PKI Multimedia | PKI IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement