IT Management  >   Systems Operations  >   Security  >   Homeland Security  >  

Protecting America's Critical Infrastructures

RSS Feed    Add to Google    Add to My Yahoo!
Protecting America's Critical Infrastructures Multimedia (View All Report Types)
 
Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management
sponsored by Commvault
WEBCAST: This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

Commvault

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Next-Generation Firewalls: Breaking Through the Hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 01 Feb 2015 | Premiered: 10 Dec 2013

SearchSecurity.com

Edge for IT Leaders
sponsored by Unisys
VIDEO: This video explains how users can have access to end-to-end services and a cloud-based ITSM solution that features a real time business service impact dashboard.
Posted: 10 Jun 2015 | Premiered: 10 Jun 2015

Unisys

Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

How Will Digital Transformation and the New Style of IT Impact Your Business?
sponsored by Hewlett-Packard Limited
VIDEO: In this video, Paul Evans, an expert on application transformation at HP, explains the keys to keeping pace with growing end user expectations for instantaneous, relevant, and robust customer experiences.
Posted: 15 Apr 2015 | Premiered: 30 Dec 2014

Hewlett-Packard Limited

An Inside Look into CA Workload Automation
sponsored by CA Technologies.
VIDEO: This video and accompanying demonstration offer an inside look into a workload automation tool that allows you to manage business processes from a single point of control.
Posted: 13 Jul 2015 | Premiered: 13 Jul 2015

CA Technologies.

A10 Networks Thunder ADC Provides Protection from Encrypted Threats
sponsored by A10 Networks
VIDEO: Access this short video to see a visualization of the threat posed by encrypted data traffic, and what a solution looks like.
Posted: 02 Jun 2015 | Premiered: 02 Jun 2015

A10 Networks

What We Can Learn from Recent Data Breaches and the ShellShock Vulnerability
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, some of the most well-known data breaches are analyzed to reveal how they occurred and what lessons they can teach us.
Posted: 29 Jun 2015 | Premiered: Oct 16, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement