IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  


RSS Feed    Add to Google    Add to My Yahoo!
e-Signatures Multimedia (View All Report Types)
Top 5 IT Trends to Watch in 2016: Workspaces for Tomorrow
sponsored by Dimension Data
WEBCAST: Work has changed radically in the past decade. Learn what two leading experts say the next wave of changes will bring.
Posted: 12 May 2016 | Premiered: May 12, 2016

TOPICS:  IT Management
Dimension Data

Evolving Endpoint Security Controls for Effective Threat Protection
sponsored by
VIRTUAL ENVIRONMENT: Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.
Posted: 16 May 2016 | Premiered: 02 May 2016

Cloud Security
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn from cloud experts Ken Won and Chris Steffen about some solutions out there to combat the concerns, challenges, and realities of securing a hybrid cloud environment.
Posted: 07 Oct 2016 | Premiered: Oct 7, 2016

Hewlett Packard Enterprise

Your Data Center: Leveraging Cloud-like Agility and Economics
sponsored by Hewlett Packard Enterprise
VIDEO: Delve into the economic advantages of a cloud consumption model for your dedicated data center. You will learn about data center provisioning that simplifies your IT infrastructure with the speed, scalability and economics of the public cloud in the privacy of your data center.
Posted: 05 Oct 2016 | Premiered: 19 Sep 2016

Hewlett Packard Enterprise

Staying Out of the Next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn how to build an effective data protection solution to reduce leakage risk and comply with regulatory demands.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security

Eliminating Confusion - Virtualization vs. Private Cloud
sponsored by Stratoscale
WEBCAST: Tune in to this webinar to clear up any cloudiness you may have about the differences between virtualization and cloud computing as well as how they fit in with SDCC and hyperconvergence.
Posted: 17 Jun 2016 | Premiered: Jun 17, 2016


Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

Video: Orchestrated Security for Private Cloud
sponsored by Intel Security
VIDEO: Data centers are now dynamic virtualized environments. Learn how to architect security into the private cloud by design.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security

Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WEBCAST: Discover the strengths and cautions for the vendors in Gartner's Intrusion Prevention Systems Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Gartner Magic Quadrant for BI and Analytics Platforms
sponsored by Microsoft
WEBCAST: Find out who Gartner says leads the field in BI and Analytics platforms as the need for agility and user autonomy grows.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement