Business of Information Technology  >   Business Management  >   Risk Management  >  

Public Health Emergencies

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Medically documented occurrence of a communicable disease or contamination caused by bioterrorism that poses a substantial risk of a significant number of human fatalities or incidents of permanent or long-term disability.
Public Health EmergenciesMultimedia (View All Report Types)
101 - 125 of 171 Matches Previous Page  | Next Page
Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

SearchSecurity.com University- Next-generation firewalls: Breaking through the hype
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.
Posted: 06 Dec 2013 | Premiered: 10 Dec 2013

SearchSecurity.com

Secure Your Apps, Docs and Devices in Minutes
sponsored by IBM
WEBCAST: In this webcast, discover a single mobile management and security platform that ensures data protection and maintains compliance across all devices used for business.
Posted: 28 Feb 2014 | Premiered: Dec 6, 2013

IBM

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Security University: Security Analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014

SearchSecurity.com

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Site visit programs fuel outsourcing success
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Solve the Mystery of Strategic Alignment with Time Tracking
sponsored by Innotas
WEBCAST: In this on-demand webinar, Mark Mullaly of ProjectManagement.com investigates issues relating to time tracking as a part of the project management process.
Posted: 13 Aug 2014 | Premiered: Apr 22, 2014

Innotas

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Real Application Testing with Oracle Database 11g
sponsored by Oracle Corporation
WEBCAST: To help them stay ahead of the competition, agile businesses need to quickly adopt new technologies. Real Application Testing - with Oracle Database 11g - allows businesses to quickly do this while eliminating the risks associated with change.
Posted: 09 Dec 2008 | Premiered: Dec 9, 2008

Oracle Corporation

Real Innovations with Real Budget
sponsored by IBM
VIDEO: Watch this video to learn how IBM Rational can help you achieve your business objectives within your budget. Topics covered include 1)Increasing Security on the Web, 2)Optimizing Software Quality Process, and 3)Improving Collaboration.
Posted: 22 Mar 2010 | Premiered: 22 Mar 2010

IBM

Recognize your Apps Personalities
sponsored by Hewlett-Packard Company
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett-Packard Company

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

SAP Solutions for Small Businesses and Midsize Companies: Leveraging Economies of Scale
sponsored by SAP AG
VIDEO: As your company grows, you have the opportunity to benefit from economies of scale; but growth can be fraught with challenge. Production disruptions and operational inefficiencies can quickly negate the advantages you hope to achieve. Watch this informative video to learn about SAP solutions for small businesses and midsize companies.
Posted: 30 Oct 2009 | Premiered: 30 Oct 2009

SAP AG

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Secure Cloud Access Reference Architecture Model
sponsored by Intel
WEBCAST: Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.
Posted: 10 May 2011 | Premiered: May 10, 2011

Intel

Securing the Extended Enterprise
sponsored by Cybertrust
WEBCAST: This webcast takes you through the growing concern of partner compliance, and what you can do to get your partners in line and also become a better, more secure, and compliant partner.
Posted: 06 Nov 2006 | Premiered: Nov 30, 2006, 12:00 EST (17:00 GMT)

Cybertrust

Security Virtual Jam Session: The Secured Enterprise
sponsored by IBM
WEBCAST: Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders.
Posted: 08 Feb 2008 | Premiered: Feb 21, 2008, 11:00 EST (16:00 GMT)

IBM

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Service Management with AppManager
sponsored by SUSE
WEBCAST: Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
Posted: 09 Aug 2006 | Premiered: Jun 3, 2004

SUSE

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault
101 - 125 of 171 Matches Previous Page    3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement