IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer Communication

RSS Feed    Add to Google    Add to My Yahoo!
Peer-to-Peer Communication Multimedia (View All Report Types)
Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Understanding BYOE and Driving the Value of UC User Experience
sponsored by ShoreTel
WEBCAST: In this webcast, Jon Arnold, Principal at J. Arnold & Associates, explains the 8 key attributes to a bring your own experience (BYOE) approach that ensures increased employee satisfaction and accelerated performance. Learn how to improve your UC with BYOE.
Posted: 13 Mar 2015 | Premiered: Mar 13, 2015


Edge for IT Leaders
sponsored by Unisys
VIDEO: This video explains how users can have access to end-to-end services and a cloud-based ITSM solution that features a real time business service impact dashboard.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015


How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

The Keys to CIO Success – a Managed Services Discussion
sponsored by IBM
VIDEO: This short video contains three high-level IT thinkers discussing the challenges facing CIOS and organizations who are moving towards managed services, and how managed services can help address infrastructure management concerns.
Posted: 10 Nov 2015 | Premiered: 14 May 2014


ServiceNow Webcast: Has the Inbox Killed Productivity?
sponsored by ServiceNow
WEBCAST: In the following webcast, learn about the various ways business can improve employee and management productivity by addressing manual processes like email and spreadsheets. Tune in now and get started on the right path to a more effective, productive, and cost effective business.
Posted: 21 Sep 2015 | Premiered: Sep 18, 2015


Unisys Tom Patterson: 3 Key Steps in Securing Critical Infrastructure
sponsored by Unisys
VIDEO: Tom Patterson, VP, GM of Unisys Global Security Solutions speaks to Business Rockstars about the need to protect Critical Infrastructure systems and offers 3 key tips to begin that discussion.
Posted: 10 Nov 2015 | Premiered: 25 Sep 2015


Realizing the Benefits of Enterprise UCC
sponsored by Dimension Data
VIRTUAL ENVIRONMENT: Disjointed communications is a drain. Learn how a unified communication and collaboration (UCC) strategy changes that.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

TOPICS:  IT Management
Dimension Data
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement