IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hat Hackers

RSS Feed    Add to Google    Add to My Yahoo!
White Hat Hackers Multimedia (View All Report Types)
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

The Evolution of Flash Storage
sponsored by Dell EMC
WEBCAST: Travel through the history of flash storage and discover the development of the next-generation storage performance.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

TOPICS:  IT Management
Dell EMC

Podcast: How Sunrise Health Region is Improving the Clinician Experience through Secure and Simple VDI
sponsored by Dell, Microsoft and Citrix
PODCAST: Tune in to this podcast to learn how Sunrise Health Region overcame long log-in times and multiple sign-in credentials from each endpoint they used daily with a VDI approach to help both users and IT.
Posted: 28 Jul 2016 | Premiered: Jul 18, 2016

Dell, Microsoft and Citrix

How to Achieve Transformative Business Outcomes with ITSM
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower operational costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

HPE Hyper Converged 380 GUI Desktop and Mobile Demo
sponsored by NTT ICT
VIDEO: Tune into this video to adopt a hyper-converged system that easily enables users to create and flourish with virtual environments. Access now to discover a more intuitive way to help end-users without virtualization experience gain the full benefits of hyper-convergence without the need of countless real-world practice hours.
Posted: 10 Aug 2016 | Premiered: 25 Mar 2016


Splunk Everywhere! OS Monitoring in the Cloud
sponsored by Splunk
WEBCAST: Get a holistic view of your cloud environment.
Posted: 08 Aug 2016 | Premiered: Aug 8, 2016

TOPICS:  IT Management

HPE Hyper Converged: "Your VM Vending Machine"
sponsored by NTT ICT
VIDEO: Conflicted IT professional, meet hyper-convergence. Access now to find out what one chosen hyper converged system can do for your business in the following video, and get started on the path to a simplified, efficient, cost-effective, and future-ready IT infrastructure.
Posted: 09 Aug 2016 | Premiered: 15 Mar 2016


Accenture: How a New Partnership Enables Digital Transformation
sponsored by Microsoft
WEBCAST: Learn how three respected enterprises teamed up to help other organizations create better solutions for the digital age.
Posted: 02 May 2016 | Premiered: May 2, 2016

TOPICS:  IT Management

Gartner Magic Quadrant for Operational DBMS
sponsored by Microsoft
WEBCAST: The operational DBMS market is growing as new entrants appear constantly. Discover who Gartner says now leads the field.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement