IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Security Scans

RSS Feed    Add to Google    Add to My Yahoo!
Security Scans Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Ansible Essentials: Simplicity in Automation Technical Overview
sponsored by Red Hat
VIDEO: Get started using Ansible automation and configuration management by watching a simple Ansible playbook be created from start to finish. Discussions and demonstrations cover provisioning, deploying, and managing compute infrastructure across cloud, virtual, and physical environments using Ansible.
Posted: 06 Feb 2017 | Premiered: 06 Feb 2017

Red Hat

A Leap Forward In Digital Education
sponsored by NetApp
WEBCAST: Learn how Western Oregon University supports 10 times the number of concurrent users in 95% less processing time.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016

TOPICS:  IT Management
NetApp

Consider These Use Cases When Selecting Your MFT Technology
sponsored by IBM
WEBCAST: Gartner shares the key challenges and recommendations in selecting the right MFT solution for your organization.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

IT at Intel: Information Sharing
sponsored by Intel Security
WEBCAST: Hear from Intel's IT Information Security department on their evolution of threat intelligence and information sharing.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Put Your Customer First with Scalable and Adaptable Unified Infrastructure Monitoring
sponsored by CA Technologies
SOFTWARE DOWNLOAD: Are disparate monitoring systems tripping you up with convoluted complexity? Download here a free trial of CA Unified Infrastructure Management, which will empower your customer-first strategies with a scalable, adaptable unified monitoring solution—eliminating the need for disparate monitoring systems.
Posted: 13 Sep 2016 | Premiered: 13 Sep 2016

CA Technologies

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Video Part 3: Operational Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Intel's CTO for Cloud/SaaS, Jamie Tischart, presents the operational questions to ask your cloud service provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement