IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Universal Product Codes

RSS Feed    Add to Google    Add to My Yahoo!
Universal Product CodesMultimedia (View All Report Types)
 
IBM System x Servers: Security, Reliability, and Efficiency
sponsored by IBM and Intel.
WEBCAST: Tune in to this exclusive webcast to hear industry veterans examine a new server system that uses innovative new technology to provide enterprise-class data protection.
Posted: 26 Aug 2014 | Premiered: Sep 8, 2014

IBM and Intel.

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Your Number One IT Security Tip is...
sponsored by Icomm Technologies
VIDEO: Tune in to this exclusive video now to learn the top tip for IT managers whose businesses are still likely vulnerable to attack.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

TOPS-HP Video Case Study: IT Infrastructure Migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video case study, learn how the right technology partner enabled grocery store retailer TOPS Markets to seamlessly migrate its IT infrastructure during the busy retail season. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2010

Hewlett-Packard Limited

Information-Driven Security through RSA Security Analytics 10.4 and RSA ECAT 4.0
sponsored by RSA
VIDEO: Learn what CISOs can do to better protect their organizations from security breaches, and why a Big Data security analytics architecture is necessary for threat detection and response.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

RSA

HP and United: Teaming together for a successful migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief video case study, learn how United Airlines achieved a quick IT migration of a large size and scale – all without impact from a technology perspective.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement