Vertical Industries  >   Information Industry  >  

Video Internet Broadcasting

RSS Feed    Add to Google    Add to My Yahoo!
Video Internet Broadcasting Multimedia (View All Report Types)
 
Analyst Perspective: The Maturing MSP Market
sponsored by Commvault
VIDEO: In this brief webcast, analyst Tim Harmon discusses the maturing managed service provider (MSP) market and the need for advanced service capabilities that focus on specific vertical industries. Watch now to see how you can reap the benefits of trusting and dependent customers with a more specialized, valued service.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Network Evolution University: Realizing the Benefits of Enterprise UC&C
sponsored by SearchUnifiedCommunications.com
VIRTUAL ENVIRONMENT: This virtual seminar focuses on how changing workforce practices are influencing unified communication strategies, how today's cloud UC services can serve businesses, and how your employees can communicate and collaborate effectively individually and in teams whether in the office, remote, or on the road.
Posted: 11 Jun 2013 | Premiered: 11 Jun 2013

SearchUnifiedCommunications.com

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

MASERGY

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Is Email Sapping your Organization's Productivity? How to Stop the Productivity Drain
sponsored by ServiceNow
WEBCAST: In this webinar, Dave Wright, Chief Strategy Officer at ServiceNow, and Ron Markham, Strategy Leader at ServiceNow, address the drain in enterprise-level productivity, and the role of email in this drain. Access this video now to examine a cloud-based service that will streamline otherwise complex work processes.
Posted: 15 Sep 2015 | Premiered: Sep 15, 2015

ServiceNow

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Case Study: The Future of Broadcast with Converged Infrastructure and Scale-Out Storage
sponsored by Dell EMC
VIDEO: Witness how one company combatted the challenges of managing large amounts of data by utilizing a storage architecture that combines converged infrastructure and scale-out solutions. See how they easily transitioned to a software-defined data center with a pre-integrated virtualized storage solution.
Posted: 20 Jul 2016 | Premiered: 07 Jun 2016

Dell EMC

Cloud First Mobile First – Introducing Enterprise Mobility as a Service
sponsored by Dimension Data
VIDEO: This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

Dimension Data

Live Demo: Getting Started with Web Protection
sponsored by LogicNow
VIDEO: This short video provides a demo for MAXfocus Web Protection, a system that enables your enterprise to be in control of your web security, web filtering and web bandwidth monitoring. Watch now to see how this platform can enable you to keep your systems secure.
Posted: 10 Feb 2016 | Premiered: 20 Jan 2016

LogicNow

Maximize the Benefits of Containers and Meet Cloud Challenges Head-on
sponsored by Red Hat
VIDEO: In this webcast, industry analyst Dave Bartoletti discusses how enterprises are using containers today and examines a broad range of relevant app use cases. Tune in now to learn more about the challenges of container adoption and discover for which workloads containers are best used.
Posted: 13 Jul 2016 | Premiered: 24 Apr 2015

Red Hat

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Every day, hackers develop new strategies for infiltrating your network and stealing your sensitive data. This expert resource explores some of the most dangerous emerging threats and how you can defend against them.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Improve the End-User Experience with Predictive Insight
sponsored by Aruba Networks
WEBCAST: This short video shows a new way for IT to manage Wi-Fi issues and failures. Using a clear dashboard, you can quickly and easily identify the location of an issue and even run tests on the fly for both network and application performance.
Posted: 05 May 2016 | Premiered: May 5, 2016

Aruba Networks

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Global Data Protection Index Highlights
sponsored by Dell EMC
VIDEO: EMC's Global Data Protection Index of 2016 revealed that most businesses are still unprepared for new, emerging threats. Discover the outlook of data protection strategies around the world, and learn how to prepare for the rapidly changing landscape of threats to enterprise data.
Posted: 30 Jun 2016 | Premiered: 28 Jun 2016

Dell EMC

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover 3 questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: Uncover key strategies for continuously preventing even the most sophisticated network attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

Leveraging the Cloud to Gain Operational Intelligence
sponsored by Splunk
VIDEO: Explore how you can gain centralized visibility across cloud, hybrid, and on-premises environments. Plus, learn how this cloud strategy can handle up to 10x data bursting, increase app uptime and performance, and much more.
Posted: 20 Apr 2016 | Premiered: 20 Apr 2016

Splunk

A Cloud That's Hands-On, So You Can Be Hands Free
sponsored by Dimension Data
VIDEO: In this brief video, learn about a company that provides a variety of cloud services, infrastructure, and software, so that your business can better meet the needs of end-users with continuous delivery.
Posted: 02 Mar 2015 | Premiered: 28 Jan 2015

Dimension Data

Case Study: Online Bank Relies on Cloud for Product Rollout
sponsored by Dimension Data
VIDEO: In this video, learn how banking giant ING Direct - a wholly online bank - was able to speed up the automation of services rollout without affecting the customer experience.
Posted: 02 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement