Public Policy Making

RSS Feed    Add to Google    Add to My Yahoo!
Public Policy MakingMultimedia (View All Report Types)
25 Matches
From MSP to CSP: Making the Transition
sponsored by Egenera
WEBCAST: Watch this webcast to find out how MSPs and enterprises can simplify and automate the delivery of IT services through the implementation of public, private and hybrid cloud services.
Posted: 12 Aug 2014 | Premiered: Jan 22, 2014

Egenera

How to Create Firewalls for Your Virtual Machines in the Public Cloud
sponsored by Zentera Systems Inc.
VIDEO: This exclusive video covers a fabric that will allow you to build firewalls for your individual virtual machines in a public cloud.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

Zentera Systems Inc.

Using the Latest Technology Trends to Stay Secure and Risk Free
sponsored by DLT Solutions
WEBCAST: Access this webcast to get an insider perspective for maintaining security when operating in the public sector.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

DLT Solutions

Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
WEBCAST: IT directors today are asked to manage seemingly limitless amounts of data. Consequently, many organizations are implementing cloud initiatives to better manage this growing problem. But where should IT start? Find out in this on-demand webcast.
Posted: 13 Jun 2014 | Premiered: Jun 13, 2014

Code42

Agility and Control with Scalr Cloud Management Platform
sponsored by Scalr
WEBCAST: In this webcast, discover how this particular cloud management platform (CMP) delivers a balance for both the development of cloud infrastructure and IT control.
Posted: 13 Oct 2014 | Premiered: Oct 13, 2014

Scalr

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

A Community Approach to your Enterprise Security
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores one company's solution and its unique community based approach to your enterprise security.
Posted: 28 May 2014 | Premiered: May 28, 2014

Hexis Cyber Solutions Inc

Information Governance Symposium: Information Governance Gets its Wings...Or does it?
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 06 Feb 2014 | Premiered: 11 Feb 2014

SearchCompliance.com

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Information Governance Symposium: Leverage predictive coding, analytics tech for information governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 28 Jan 2014 | Premiered: 31 Jan 2014

SearchCompliance.com

Countdown: Top 5 technologies to help battle the new spam threat
sponsored by Trend Micro, Inc.
PODCAST: In this featured podcast, Michael Cobb counts down the top 5 ways for your company to battle new and evolving spam threats, and discusses the pros and cons of current antispam technologies.
Posted: 27 Nov 2007 | Premiered: Nov 27, 2007, 09:00 EST (14:00 GMT)

Trend Micro, Inc.

Outsourcing Infrastructure: An Insightful TCO Analysis of On-Premise vs. Outsourced Workloads
sponsored by Rackspace
WEBCAST: This exclusive whitepaper will help you make an informed decision on whether or not you should outsource your IT services.
Posted: 18 Jun 2014 | Premiered: Jun 18, 2014

Rackspace

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Security University: Data Loss Prevention
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Dive into this SearchSecurity.com classroom to learn the difference between suite and point product approaches. Find out how to assess what to focus on within your own organization, and learn the pitfalls in DLP implementation.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013

SearchSecurity.com

Bridging the IT Operations-Application Owner Gap
sponsored by VMTurbo
WEBCAST: This exclusive whitepaper provides in-depth look at the challenges creating the division between infrastructure managers and application owners, each side's point of view, a solution that can close the gap and more.
Posted: 22 Aug 2014 | Premiered: Aug 22, 2014

VMTurbo

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation.  End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 19 Sep 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

DR-to-the-Cloud Best Practices
sponsored by Rackspace
WEBCAST: This exclusive whitepaper will provide you with a set of best practices for disaster recovery in the cloud.
Posted: 18 Jun 2014 | Premiered: Jun 18, 2014

Rackspace

Quest Recovery Manager for Active Directory - Tips and Tricks
sponsored by Dell Software
WEBCAST: Are you using Quest Recovery Manager for Active Directory to its full potential? We have a Webcast that will show you some of the great things that Recovery Manager has to offer.
Posted: 06 Nov 2006 | Premiered: Nov 3, 2006

Dell Software

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

BPM Adoption Patterns & Practices in Industry
sponsored by Oracle Corporation UK Ltd
WEBCAST: Watch this webcast to learn how organizations in the financial services, communications, utilities, and retail industries are adopting business process management (BPM) software and using best practices to address their pertinent process challenges to deliver relevant business value.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Oracle Corporation UK Ltd

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42

Security Practices for Vmware
sponsored by Vyatta Inc.
WEBCAST: This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.
Posted: 03 Aug 2012 | Premiered: Jun 20, 2012

Vyatta Inc.

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

An Essential for Better Quality and Governance: Test Data Management
sponsored by IBM
WEBCAST: This webcast explores the relationship between test data management and data quality and governance, and how a test data management strategy leads to smarter insights, faster responses to market demands, and more.
Posted: 23 Dec 2013 | Premiered: Nov 6, 2013

IBM
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement