Vertical Industries  >   Information Industry  >  

Video Internet Broadcasting

RSS Feed    Add to Google    Add to My Yahoo!
Video Internet Broadcasting Multimedia (View All Report Types)
 
Analyst Perspective: The Maturing MSP Market
sponsored by Commvault
VIDEO: In this brief webcast, analyst Tim Harmon discusses the maturing managed service provider (MSP) market and the need for advanced service capabilities that focus on specific vertical industries. Watch now to see how you can reap the benefits of trusting and dependent customers with a more specialized, valued service.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Network Evolution University: Realizing the Benefits of Enterprise UC&C
sponsored by SearchUnifiedCommunications.com
VIRTUAL ENVIRONMENT: This virtual seminar focuses on how changing workforce practices are influencing unified communication strategies, how today's cloud UC services can serve businesses, and how your employees can communicate and collaborate effectively individually and in teams whether in the office, remote, or on the road.
Posted: 11 Jun 2013 | Premiered: 11 Jun 2013

SearchUnifiedCommunications.com

eCommerce Payment Security 101
sponsored by CyberSource
VIDEO: You're more than an online provider of goods and services -- you're a trusted vault of sensitive customer data. Discover ways to streamline and automate payment operations while simplifying fraud management and payment security.
Posted: 20 Jun 2016 | Premiered: 16 Jan 2015

CyberSource

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Is Email Sapping your Organization's Productivity? How to Stop the Productivity Drain
sponsored by ServiceNow
WEBCAST: In this webinar, Dave Wright, Chief Strategy Officer at ServiceNow, and Ron Markham, Strategy Leader at ServiceNow, address the drain in enterprise-level productivity, and the role of email in this drain. Access this video now to examine a cloud-based service that will streamline otherwise complex work processes.
Posted: 15 Sep 2015 | Premiered: Sep 15, 2015

ServiceNow

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Cloud Computing and Banking: Combatting ATM Fraud
sponsored by Splunk
VIDEO: In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.
Posted: 06 Apr 2016 | Premiered: 06 Apr 2016

Splunk

Case Study: The Future of Broadcast with Converged Infrastructure and Scale-Out Storage
sponsored by EMC
VIDEO: Witness how one company combatted the challenges of managing large amounts of data by utilizing a storage architecture that combines converged infrastructure and scale-out solutions. See how they easily transitioned to a software-defined data center with a pre-integrated virtualized storage solution.
Posted: 20 Jul 2016 | Premiered: 07 Jun 2016

EMC

BlaBlaCar Drives the Sharing Economy with Big Data Analytics
sponsored by Hewlett-Packard Enterprise
VIDEO: View this brief video to learn about the big data analytics platform that empowered a ridesharing service to improve the user experience and test new product features. Discover how this strategy accelerates analysis of large amounts of data to produce actionable insights faster.
Posted: 17 Mar 2016 | Premiered: 17 Mar 2016

Hewlett-Packard Enterprise

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Cloud First Mobile First – Introducing Enterprise Mobility as a Service
sponsored by Dimension Data
VIDEO: This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

Dimension Data

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Live Demo: Getting Started with Web Protection
sponsored by LogicNow
VIDEO: This short video provides a demo for MAXfocus Web Protection, a system that enables your enterprise to be in control of your web security, web filtering and web bandwidth monitoring. Watch now to see how this platform can enable you to keep your systems secure.
Posted: 10 Feb 2016 | Premiered: 20 Jan 2016

LogicNow

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Build a better wide area network with Managed Software-Defined WAN from Verizon
sponsored by Verizon
VIDEO: Flexibility, speed and performance are the three pillars of a dynamic WAN. Watch this 2 minute video to learn about a managed SD-WAN service that provides all three and more.
Posted: 26 May 2016 | Premiered: 26 Feb 2016

Verizon

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: In a recent survey, 84% of companies said spear phishing attacks got through their defenses. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Improve the End-User Experience with Predictive Insight
sponsored by Aruba Networks
WEBCAST: This short video shows a new way for IT to manage Wi-Fi issues and failures. Using a clear dashboard, you can quickly and easily identify the location of an issue and even run tests on the fly for both network and application performance.
Posted: 05 May 2016 | Premiered: May 5, 2016

Aruba Networks

Create a Workplace for a User-Centric World
sponsored by Atos
VIDEO: Discover in this video how digitalized services with seamless technologies can facilitate digital transformation in 4 core areas of your business: customer experience, business reinvention, compliance, and operational excellence. Tune in to also see how Windows 10 and other collaborative platforms pair with these services.
Posted: 27 Jun 2016 | Premiered: 27 Jun 2016

Atos

Operational Excellence: Transforming Your Virtual Workplace and Digital Diversity
sponsored by Atos
VIDEO: Tune into this video to ensure continuity in the face of digitally disruptive technologies by discovering how to standardize granular business processes and enable dynamic construction of end-to-end computing capabilities. Take advantage of omni-channel support tailored to your digital environment.
Posted: 27 Jun 2016 | Premiered: 27 Jun 2016

Atos

Maximize the Benefits of Containers and Meet Cloud Challenges Head-on
sponsored by Red Hat
VIDEO: In this webcast, industry analyst Dave Bartoletti discusses how enterprises are using containers today and examines a broad range of relevant app use cases. Tune in now to learn more about the challenges of container adoption and discover for which workloads containers are best used.
Posted: 13 Jul 2016 | Premiered: 24 Apr 2015

Red Hat

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement