IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hat Hackers

RSS Feed    Add to Google    Add to My Yahoo!
White Hat Hackers Multimedia (View All Report Types)
 
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Study: Cloud Automation for Straightforward Cloud-Enablement
sponsored by Embotics
VIDEO: Cloud automation enables employees to focus on more complex and involved tasks while better serving the rest of the enterprise. Watch this 2 minute video to learn about a straightforward path to cloud-enablement and see the benefits one IaaS provider realized by installing cloud automation.
Posted: 28 Oct 2016 | Premiered: 28 Oct 2014

Embotics

Customer Story: Why I Invest in Next-Gen Tech
sponsored by Rubrik
WEBCAST: Matt Day, IT Manager at Langs Building Supplies, discusses his approach to transforming the data center, covers the real world challenges he has faced and shares the lessons he has learned in deploying next-gen technologies.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rubrik

Splunk Everywhere! OS Monitoring in the Cloud
sponsored by Splunk
WEBCAST: Get a holistic view of your cloud environment.
Posted: 08 Aug 2016 | Premiered: Aug 8, 2016

TOPICS:  IT Management
Splunk

Technology-driven business strategy vs. busines-driven technology strategy
sponsored by BDNA
WEBCAST: This informative webcast sheds some light not only on the difference between business-driven technology strategies versus technology-driven business strategies but when it is ideal to use them. It also stresses the importance of ITAM, and how ITAM paired with the IT team in your enterprise can prove to be a powerful combination.
Posted: 04 Nov 2016 | Premiered: Jul 27, 2016

BDNA

Road Map: The Data Security and Privacy Playbook
sponsored by IBM
WEBCAST: Consider these five key characteristics when modernizing your legacy file transfer environment with MFT technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Video Part 2: Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Jamie Tischart, Intel's CTO for Cloud/SaaS, offers privacy questions to ask your cloud service provider.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement