IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed    Add to Google    Add to My Yahoo!
Public SafetyMultimedia (View All Report Types)
 
Boost Data Center Agility with Data Center Infrastructure Management
sponsored by nlyte Software
VIDEO: This webinar focuses on how to make your data center more agile with effective infrastructure management.
Posted: 12 Aug 2014 | Premiered: 26 Jun 2014

nlyte Software

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Hit the Resource Management Jackpot: 4 Critical Success Factors for Project-Driven Resource Management
sponsored by Innotas
WEBCAST: Andy Jordan of Projects at Work discusses the 4 critical success factors for effective resource management and how to introduce these into your organization.
Posted: 13 Aug 2014 | Premiered: Feb 20, 2014

Innotas

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Protect Mobile Data without Restricting Users
sponsored by Bit9 + Carbon Black
WEBCAST: In this informative webcast, explore a new mobile security solution which provides mobile security and visibility without forcing users to stop using their preferred apps and devices.
Posted: 15 Aug 2014 | Premiered: Mar 5, 2014

Bit9 + Carbon Black

Figuring out FIDO
sponsored by HID
WEBCAST: This expert webcast explains the benefits of following the FIDO standard that creates universal authentication, as well as the latest information regarding the FIDO alliance.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

Ensure the Safety & Security of Apps, Documents E-Mails and More
sponsored by IBM
VIDEO: Uncover the ins-and-outs of a leading secure productivity suite that promises to protect your employee's e-mails, documents, apps and the web for work.
Posted: 05 Sep 2014 | Premiered: 05 Sep 2014

IBM

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Rocket Software: Predictive & Proactive IT and Data Protection Management
sponsored by IBM
WEBCAST: Watch this video to find out how one solution is helping organizations proactively manage heterogeneous and complete IT, storage and data protection infrastructures. Prevent outages and failures with predictive capabilities like real-time content and alerts.
Posted: 25 Aug 2014 | Premiered: Feb 12, 2014

IBM

How to Drive User Adoption in New Technology Deployment
sponsored by Code42
WEBCAST: How can you successfully deploy a new technology and ensure users are on board? In this on-demand webinar, Paul Glen, author of "The Geek Leader's Handbook," delves into the interpersonal issues IT faces when implementing a new technology and shares how user adoption is the key to a successful deployment.
Posted: 07 Jul 2014 | Premiered: Jul 3, 2014

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement