IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Personal Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Personal Data Privacy Multimedia (View All Report Types)
 
Secure, Scalable Content Collaboration
sponsored by IBM
VIDEO: This short video highlights how a CIO of a national leading bank improved critical steps of a loan application process to ensure sensitive customer information and documents are being handled in the best way. Gain ideas on how you can improve your content management processes to keep important information secure and help improve customer service.
Posted: 27 Jul 2016 | Premiered: 17 Mar 2016

IBM

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Cut Through the Hype of Hyper-Converged
sponsored by NTT ICT
VIDEO: Get informed about the truth behind hyper-converged infrastructure in the following webcast featuring HPE's Director of Software-Defined Storage, Rob Strechay. Learn where this technology fits, where it doesn't; how to utilize it in your own business and more.
Posted: 05 Aug 2016 | Premiered: 16 Dec 2015

NTT ICT

Facing up to Mobile Security Challenges
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

Transformative Business Outcomes Service Management
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower ops costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

HC380: Your New VM Vending Machine
sponsored by NTT ICT
VIDEO: In this video, see for yourself how quickly and effectively hyper-converged infrastructure can enable businesses to deploy new VMs faster and more efficiently than ever before. View now to learn more.
Posted: 06 Sep 2016 | Premiered: 15 Mar 2016

NTT ICT

What If an Invisible Attacker Tried to Bring Down Your Business?
sponsored by Lenovo
PODCAST: In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.
Posted: 10 Aug 2016 | Premiered: Aug 10, 2016

Lenovo

Six Key Performance and Sizing Considerations When Creating Your Software-Defined Storage Cluster
sponsored by Red Hat
WEBCAST: Designing a software-defined storage (SDS) cluster can be a complicated exercise—and one size certainly does not fit all. This webcast details the six key performance and sizing considerations to keep in mind when you create your SDS cluster.
Posted: 01 Sep 2016 | Premiered: Feb 17, 2016

Red Hat

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement