Business of Information Technology  >   Business Management  >   Risk Management  >  

Public Health Emergencies

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Medically documented occurrence of a communicable disease or contamination caused by bioterrorism that poses a substantial risk of a significant number of human fatalities or incidents of permanent or long-term disability.
Public Health Emergencies Multimedia (View All Report Types)
26 - 50 of 171 Matches Previous Page  |  Next Page
Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Confidence in the Breach Age: Risks, Preparation, Response & Recovery
sponsored by AllClear ID
WEBCAST: Your organization needs to better understand risks, prepare to face a breach, and know how to respond to generate the best outcome possible. In this webinar, a panel of security experts provides insights and recommendations regarding breach risks, preparation, response, and recovery.
Posted: 01 Jul 2016 | Premiered: Aug 20, 2016

AllClear ID

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers
sponsored by ComputerWeekly.com
WEBCAST: When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development.
Posted: 26 Oct 2011 | Premiered: Jan 10, 2011

ComputerWeekly.com

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Free Download: Real-Time, Comprehensive Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AlienVault

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
sponsored by EnterpriseDB Corporation
WEBCAST: Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)

EnterpriseDB Corporation

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Enhancing Enterprise Security in 2016
sponsored by Intel
WEBCAST: In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Ensuring VoIP Quality of Service
sponsored by SUSE
WEBCAST: Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
Posted: 09 Aug 2006 | Premiered: May 24, 2006

SUSE

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
sponsored by SAP AG
VIDEO: Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
Posted: 17 Sep 2010 | Premiered: 17 Sep 2010

SAP AG

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Getting started in Software Asset Management
sponsored by Centennial Software
WEBCAST: Listen to this Webcast to hear Forrester's Evelyn Hubbert discuss SAM benefits, the specific technologies involved in deploying SAM and how it can help your organization ensure security and compliance.
Posted: 11 Oct 2007 | Premiered: Oct 2, 2007, 11:00 EDT (15:00 GMT)

Centennial Software
26 - 50 of 171 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement