IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hats

RSS Feed    Add to Google    Add to My Yahoo!
White Hats Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Watson in TSS
sponsored by IBM
VIDEO: This webcast offers information about a solution that harnesses cognitive computing to assist with customer support. It diagnoses service requests to identify the best resolution almost instantaneously. Access this webcast now to see some of the client benefits this system has to offer.
Posted: 15 Dec 2016 | Premiered: 01 Nov 2016

IBM

Explore SIEM in the Cloud
sponsored by Splunk
WEBCAST: Explore SIEM in the Cloud
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Kinetic IT
sponsored by McAfee, Inc.
VIDEO: Hear from Kinetic IT's Security Service Director on the successful fourteen year partnership with McAfee.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Rapidly Turn Innovation Into Value With Digitalisation
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how digitalisation allows AkzoNobel to accelerate innovation and work smarter.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

Transform Your Data With a Single Solution
sponsored by IBM
WEBCAST: Avoid increase costs and delayed projects. Learn how to deploy a single transformation solution across your enterprise.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

A Complete Paradigm Shift in Enterprise Storage
sponsored by IBM
WEBCAST: It's time to get more value from your data storage solution. Answer these questions for a comparative cost of ownership.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement