Vertical Industries  >   Market Segments  >  

Remote Office Branch Office

RSS Feed    Add to Google    Add to My Yahoo!
Remote Office Branch Office Multimedia (View All Report Types)
Case Study: Increasing Efficiency in Branch Office Management
sponsored by Riverbed Technology, Inc.
VIDEO: In this case study, an IT professional from a mechanical engineering company discusses how he found an easier, more efficient and more cost-effective way to manage branch office IT.
Posted: 25 Nov 2015 | Premiered: 25 Nov 2015

Riverbed Technology, Inc.

Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami
sponsored by Dell Software
WEBCAST: In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.
Posted: 11 Jul 2012 | Premiered: Apr 24, 2012

Dell Software

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010


Upgrade and Onboard Windows 10: Next-Gen Enterprise Mobility
sponsored by Microsoft
WEBCAST: In this webcast, Independent Analyst, Jack Madden and Michael Wallent, Director of Program Management for and Mobility at Microsoft, address the driving motivations and offer expert support behind enterprise Windows 10 migration.
Posted: 19 Nov 2015 | Premiered: Nov 19, 2015


Improve Your User Experience with Mobile Application Development
sponsored by IBM
WEBCAST: In this webcast, you will learn how transform customer information garnered from your mobile apps into actionable data. Access this video to accelerate the delivery of your mobile strategy provide users with a more engaging experience.
Posted: 30 Oct 2015 | Premiered: Jun 18, 2015


Take Team Collaboration to the Next Level: A UC Webcast Series
sponsored by Polycom, Inc.
WEBCAST: In this four-part webcast series, you will discover how to take your team collaboration to the next level by upgrading your conference phone, mobilizing meeting spaces, and driving presence in your organization.
Posted: 24 Nov 2015 | Premiered: Nov 24, 2015

Polycom, Inc.

Leverage Videoconferencing to Improve Enterprise Collaboration
sponsored by VBrick
VIDEO: In this webcast, Irwin Lazar, VP and Service Director at Nemertes Research, takes an in-depth look at how to leverage videoconferencing to improve enterprise collaboration. Learn how to implement successful videoconferencing strategies in your organization.
Posted: 03 Nov 2015 | Premiered: 02 Nov 2015


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Simplify Your HIT Needs
sponsored by Commvault
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013


How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Webinar: The Importance of Identity Management within an Office 365 Implementation
sponsored by Ping Identity Corporation
WEBCAST: Examine the pros and cons of each Microsoft Office 365 IAM approaches as well as a 5 question IAM self-evaluation guide to aid you in building your strategy. Discover the IAM requirements to secure access beyond Office 365 as well as third-party approaches that may bring you closer to your security goals.
Posted: 26 Oct 2015 | Premiered: Sep 30, 2015

Ping Identity Corporation

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014


The New Style of Business
sponsored by Hewlett Packard Enterprise
WEBCAST: This short webcast highlights some of the biggest technologies that are affecting businesses today, and what they mean for the role of IT.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett Packard Enterprise

A Cloud-Enabled Communications Case Study: Platinum Partners
sponsored by ThinkingPhones
WEBCAST: In this webcast, Paul Poteat, Chief Technology Officer at Platinum Partners, briefly discusses how his organization accelerated its enterprise mobility with cloud communications services. View this video now to learn how to drive intelligent communications in your enterprise, using a cloud-enabled collaboration platform.
Posted: 01 Sep 2015 | Premiered: Jul 28, 2015


Embracing the Greatest UC Adoption Challenges with Skype for Business
sponsored by IR
WEBCAST: In this webcast, Thomas Pöett and Hans Jörg Friedrich, from Integrated Research Ltd, discuss the latest technologies enabling successful unified communications (UC), and in particular Skype for Business. Watch now to address the biggest deployment challenges facing companies today.
Posted: 26 Oct 2015 | Premiered: May 19, 2015


Free Trial: MSP Anywhere
sponsored by Solarwinds N-able
PRODUCT DEMO: This link brings you to a free trial for a leading managed service provider which allows you to remotely support any computer in your enterprise, instantly.
Posted: 19 Nov 2015 | Premiered: 19 Nov 2015

Solarwinds N-able

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

Cloud First Mobile First – Introducing Enterprise Mobility as a Service
sponsored by Dimension Data
VIDEO: This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

Dimension Data

Network Evolution University: Realizing the Benefits of Enterprise UC&C
sponsored by
VIRTUAL ENVIRONMENT: This virtual seminar focuses on how changing workforce practices are influencing unified communication strategies, how today's cloud UC services can serve businesses, and how your employees can communicate and collaborate effectively individually and in teams whether in the office, remote, or on the road.
Posted: 11 Jun 2013 | Premiered: 11 Jun 2013

Network Evolution University: Video Conferencing and Collaboration
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, our experts examines how desktop video is enabling the focus on collaboration, best practices for using desktop video, and policies to manage its use and protect the network.
Posted: 19 Mar 2013 | Premiered: 19 Mar 2013

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Webinar: Identity Provisioning in Office 365 and Azure AD
sponsored by Ping Identity Corporation
WEBCAST: Organizations need to determine which strategy will best fit their circumstances. In this webinar, industry insiders discuss different ways to handle IAM for Office 365 users and provide a simple, comprehensive SSO experience. View now to reveal how to eliminate identity synchronization complexity.
Posted: 26 Oct 2015 | Premiered: Sep 16, 2015

Ping Identity Corporation

Monitoring Citrix Mobile Workspace with SCOM plug-in
sponsored by ComTrade
VIDEO: This webcast details a plug-in for Microsoft System Center Operations Manager (SCOM) monitoring platform that monitors the Citrix Workspace Suite. Watch now to see a demo of this solution and find out how its capabilities cover the entire Workspace Suite components.
Posted: 12 Aug 2015 | Premiered: 22 May 2015


A Solid Mobility Strategy Can Improve Quality of Service
sponsored by Dimension Data
VIDEO: Access this video to learn how one company improved their quality of service by implementing a sound mobility strategy. Tune in to learn how to craft a mobility strategy that will improve efficiency, and keep staff as well as clients happy.
Posted: 11 Mar 2015 | Premiered: 11 Mar 2015

Dimension Data

Morehouse College: Unified and Streamlined Identity
sponsored by Centrify Corporation
VIDEO: In this webinar, review how Morehouse College solved these issues and streamlined password management for users. Tune in now and discover how they tied all of their disparate systems together to reduce IT strain.
Posted: 23 Oct 2015 | Premiered: 23 Oct 2015

Centrify Corporation

What if your App Virtualization Solution Didn't Support Client Mics?
sponsored by Dell, Inc.
VIDEO: Access this video to discover how the microphone impaired an employee's ability to be heard within a meeting – ultimately causing undesired results. Find out how this could have been avoided by using an application virtualization solution.
Posted: 09 Sep 2015 | Premiered: 20 Jan 2015

Dell, Inc.

What If Your App Virtualization Solution Didn't Support Client Mics?
sponsored by Dell, Inc. and Intel®
VIDEO: In this "What If?" video with our virtualization expert Brian Madden, discover how a microphone impaired an employee's ability to be heard within a meeting – ultimately causing undesired results. Find out how this could have been avoided by using an application virtualization solution.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement