IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hat Hackers

RSS Feed    Add to Google    Add to My Yahoo!
White Hat Hackers Multimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Unleash Simplicity with VCE Converged Infrastructure
sponsored by VCE
WEBCAST: Watch this webcast to learn about a converged infrastructure that promises faster deployment, improved availability, and immediate savings in time and money designed not just for large organizations, but also for the middle-market enterprise to take advantage of.
Posted: 20 May 2014 | Premiered: May 20, 2014

VCE

Short Webcast: Avoiding the Data Apocalypse
sponsored by Commvault
VIDEO: Data collection is growing too fast for most companies to handle. Learn how to deal with the volume now.
Posted: 30 Jun 2015 | Premiered: 30 Jun 2015

TOPICS:  IT Management
Commvault

Empowering Customers with 'People-Centric IT'
sponsored by RES Software
VIDEO: The following resource introduces RES IT Store, an IT service delivery platform that can allow businesses to deliver services to both users and IT by giving users an easy-to-use, self-service IT portal where they can interact with IT without delay, and while allowing the delivery of services when needed without manual intervention.
Posted: 05 Jun 2015 | Premiered: 05 Jun 2015

RES Software

Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management
sponsored by Commvault
WEBCAST: This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

Commvault

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO: This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015

Absolute Software

What defines an effective user experience?
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success.
Posted: 10 Mar 2014 | Premiered: Nov 17, 2013

Hewlett-Packard Limited

Harnessing the Power of Unified IT Monitoring
sponsored by CA Technologies.
VIDEO: This informative video details how technology can help you advance IT and your organization to help keep customers coming back.
Posted: 25 Jun 2014 | Premiered: 25 Apr 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement