IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Security Testing

RSS Feed    Add to Google    Add to My Yahoo!
Security Testing Multimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Transforming Your Data-Driven IT Organization
sponsored by Windsor Group
VIDEO: Tune into this video to learn how to transform your data-driven organization and service delivery by leveraging the market insight and expertise of one ITSM provider. Learn how to determine the best ITSM sourcing strategy for you, and transform your IT operations with an alternative delivery and market pricing model evaluation.
Posted: 16 May 2016 | Premiered: 16 May 2016

Windsor Group

Digital Transformation on the CIO's Agenda
sponsored by Dimension Data
VIDEO: Derek Wilcocks, CIO of Dimension Data, discusses how enterprises are transforming their business to be a more efficient, speedy, and agile organization. Discover how the CIO's role is transforming into an architect of your business strategy.
Posted: 07 Jul 2016 | Premiered: 07 Feb 2016

Dimension Data

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

HPE Hyper Converged 380 GUI Desktop and Mobile Demo
sponsored by NTT ICT
VIDEO: Tune into this video to adopt a hyper-converged system that easily enables users to create and flourish with virtual environments. Access now to discover a more intuitive way to help end-users without virtualization experience gain the full benefits of hyper-convergence without the need of countless real-world practice hours.
Posted: 10 Aug 2016 | Premiered: 25 Mar 2016

NTT ICT

Expert guidance for DCIM: Data Center Information Management Solutions
sponsored by Schneider Electric
PODCAST: How can you ensure that your DCIM implementation will be a success? Tune into this podcast to discover how you can avoid the common pitfalls of DCIM software implementation and ensure the success of your DCIM strategy, and learn how to leverage scalable, modular architecture with strong vendor support.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

The Business Case for Hyperconverged VDI
sponsored by Pivot3
WEBCAST: Bruce Milne, CMO of Pivot3 and David Floyer, CTO & Co-Founder of Wikibon, take a look at the current data market and how digital trends are creating the need for agile technologies. You'll explore how hyperconverged VDI compares to traditional white-box VDI strategies.
Posted: 24 Jun 2016 | Premiered: Jan 28, 2016

Pivot3

How to Slash RPO and RTO for Timely, Dependable Recovery
sponsored by Riverbed Technology, Inc.
WEBCAST: Backup and recovery is crucial for ROBOs. Find out why not all solutions are created equal, and how to maximize speed.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement