Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement Programs Multimedia (View All Report Types)
126 - 150 of 184 Matches Previous Page  |  Next Page
SIM for Threat Monitoring Classroom
sponsored by
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

Social Threat Intelligence: A New Way to Stay Ahead of Hackers
sponsored by Threatstream
PODCAST: This podcast explores social threat intelligence, a new approach to threat intelligence that enables you to share threat information with other businesses in real time.
Posted: 25 Sep 2015 | Premiered: Jun 15, 2015


Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast introduces the concept of social threat intelligence (STI) and explains why it has the potential to reshape security.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


Solution Overview: Visibility Redefined
sponsored by GT Nexus
VIDEO: Hear directly from supply chain executives as to how they are utilizing visibility in the cloud to manage both the physical and financial supply chain.
Posted: 23 Feb 2015 | Premiered: 23 Feb 2015

GT Nexus

Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST: This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015

Check Point Software Technologies Ltd.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WEBCAST: In this webinar, three cyber security veterans discuss today's rapidly evolving cyber threat landscape and how you can detect advanced threats that normally go undetected.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Swisscomm Uses HPE Security to Provide Superior and Secure Client Services
sponsored by Hewlett-Packard Enterprise
VIDEO: Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more!
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Enterprise

Systems of Engagement: The Future of Enterprise IT
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this brief on-demand video, Forrester Research Vice President and Principal Analyst John McCarthy describes how systems of engagement are shaping the future of enterprise IT. Tune in to learn more today.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Enterprise

Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


The Benefits of a Virtual Security Operations Center
sponsored by IBM
VIDEO: In this video, you'll discover how a virtual security operations center can provide you with all the tools you need to fight today's advanced threats.
Posted: 21 Sep 2015 | Premiered: 12 Apr 2013


The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, a security expert discusses why the first 48 hours after a cyber-breach are vital to preserving your business and its reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Enterprise

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013


Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos, Inc.

Strategies for Driving Operational Efficiency and Reducing Costs
sponsored by Cisco Systems, Inc.
PODCAST: Find out how Jeremy Gill, CIO, Michael Baker Corporation, is using technology to optimize processes while delivering cost savings and superior customer service.
Posted: 16 Mar 2011 | Premiered: Mar 16, 2011

Cisco Systems, Inc.

Sybase IQ 15: More Flexibility to Adapt and Grow
sponsored by Sybase, an SAP company
WEBCAST: Please join Bill Jacobs, Director of Technical Marketing, Sybase IQ, in this webcast about the first of seven topic areas – as he discusses the new features added to Sybase IQ 15 that enhance the flexibility of Sybase IQ 15 for analytics, reporting and business intelligence applications.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Sybase IQ 15: Smarter Analytics
sponsored by Sybase, an SAP company
WEBCAST: Businesses today are facing a very different kind of competition that is rooted in extensive data analysis and demonstrated in decision making that is fast, comprehensive, and based on factual information. In this environment, Sybase IQ shines as a highly optimized analytic server.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Sybase Video: Complex Event Processing for Continuous Intelligence
sponsored by Sybase, an SAP company
VIDEO: Discover how Sybase uses Complex Event Processing to help financial services companies capitalize on critical opportunities as they happen. This real-time Continuous Intelligence delivers actionable insights to enable informed decisions that can increase revenue, solve customer problems and reduce risk.
Posted: 08 Jul 2011 | Premiered: 08 Jul 2011

Sybase, an SAP company

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014


The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

The Anatomy of an Archiving Project
sponsored by Princeton Softech
WEBCAST: Corporations worldwide rely on archiving as a best practice to control costs, improve service levels and automate data retention across multiple business areas.
Posted: 05 Feb 2007 | Premiered: Feb 15, 2007, 14:00 EST (19:00 GMT)

Princeton Softech

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010

126 - 150 of 184 Matches Previous Page    4 5 6 7 8    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement