IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Systems Administrators

RSS Feed    Add to Google    Add to My Yahoo!
Systems Administrators Multimedia (View All Report Types)
 
IT Infrastructure Strategy: Building for Stability and Agility
sponsored by Red Hat
VIDEO: Access this short video now to hear from Tim Yeaton, Senior VP at the Infrastructure Business Group as he discusses how you can build your IT infrastructure for stability and agility with the help of technological innovations.Discover what new technologies can help improve your organization's IT infrastructure to better meet your business needs.
Posted: 01 Jul 2015 | Premiered: 16 Apr 2015

Red Hat

What’s New in CA Workload Automation
sponsored by CA Technologies
WEBCAST: IT needs to drive business revenue but frequently business demand is outpacing IT budgets and resources. Watch this webcast that discusses present day scheduling and data center challenges and trends in workload automation.
Posted: 21 Jun 2011 | Premiered: Jun 15, 2011

CA Technologies

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

Manager's Guide to Oracle Cost Containment
sponsored by EnterpriseDB Corporation
WEBCAST: This Webcast explores a variety of cost containment strategies for IT, as well as potential risk and reward scenarios.
Posted: 19 May 2009 | Premiered: Jun 11, 2009, 14:00 EDT (18:00 GMT)

EnterpriseDB Corporation

It's Not "If" You Collaborate, But "How"
sponsored by Cisco Systems, Inc.
VIDEO: To learn more about who collaborates and why, Cisco recently conducted one of the first comprehensive studies of the personal and cultural factors associated with successful adoption of network based collaboration. Read the full report, and find out more about how collaboration transforms business.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

Cisco Systems, Inc.

Empower Your Business Communications with UC and Mobile Workers
sponsored by ShoreTel
WEBCAST: Discover how to unify your enterprise communication technologies—whether for voice, video, or IM—on one management platform for easy service deployment. Tune into this webcast now to learn how to leverage the power of pure IP and promote an accelerated collaborative enterprise environment.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

ShoreTel

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. View now to learn how becoming a technology partner with Citrix can expand your business reach.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Make Your Cloud Email Migration a Smooth Transition
sponsored by Mimecast
WEBCAST: Watch this two-part webinar to learn the benefits of migrating your email to the cloud, and the questions you should ask before doing so. Learn tips on how you can have a seamless cloud migration.
Posted: 26 Oct 2015 | Premiered: Feb 25, 2015

Mimecast

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

SQL Safe Backup: Hands-free Backup Across Your SQL Servers
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

ERP for Enterprise Project Management (EPM)
sponsored by IFS
WEBCAST: This webcast investigates how enterprise resource planning (ERP) supports project-based business models, and explores the need for integration between ERP systems and project management software.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

IFS

Case Study: ARK Logistics and Transportation
sponsored by Infor
VIDEO: Join Ferdian Armia, ARK's business development director, and IT-finance director Antonius Irman Khoe as they explain how ERP technology helped them with inventory control, warehouse management, reporting, and more.
Posted: 21 Jan 2016 | Premiered: 21 Jan 2016

Infor

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014

SearchMobileComputing

The Crucial Security Role of a Cloud Directory
sponsored by Microsoft
WEBCAST: In this webcast, independent analyst and blogger Jack Madden takes a closer look at how a cloud directory can play a crucial security role in user and identity management for mobile and beyond.
Posted: 18 Jan 2016 | Premiered: Jan 18, 2016

Microsoft

Continuous Testing: How to Streamline Performance, Regression, and Security Testing
sponsored by Citrix and NRG Global
WEBCAST: This webinar reveals how you can use a continuous testing strategy to incorporate any alterations into your environment quickly and with confidence.
Posted: 26 Oct 2015 | Premiered: Nov 4, 2015

Citrix and NRG Global

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015

Mimecast

How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015

IBM

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Meet HDAP: Directory Innovation Based on Big Data Technology
sponsored by Radiant Logic, Inc.
WEBCAST: View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments.
Posted: 27 May 2014 | Premiered: May 27, 2014

Radiant Logic, Inc.

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Beating Back Malicious Mobile Apps
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will help your organization establish and enforce policy and deploy technology that will beat back malicious mobile apps.
Posted: 18 Nov 2013 | Premiered: 18 Nov 2013

SearchSecurity.com

SIM for Threat Monitoring Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This lesson helps enterprises learn how to catalog the types of threats that they confront, and goes on to identify those which could be addressed through the expedient use of a SIEM approach.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

What Are You Missing from Your 2016 Security Budget?
sponsored by OptioLabs
WEBCAST: Access this webcast to learn how to get the security you need while still balancing your budget.
Posted: 14 Dec 2015 | Premiered: Nov 23, 2015

OptioLabs

Respond to Any Attack with Deep Network Insights
sponsored by Proofpoint, Inc.
VIDEO: This video examines how deep insights into your network can keep you safe no matter what your users let in. Watch and discover how you can respond to an attack across any device before it can do any harm.
Posted: 30 Dec 2015 | Premiered: 28 Oct 2015

Proofpoint, Inc.

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement