Search Results for: Property-

Did you mean: property
    All     White Papers   Multimedia   IT Downloads 
1 - 10 of 55 Matches Previous Page  |  Next Page
IBM Rational Asset Manager e-Kit
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.

IBM

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

Juniper Networks, Inc.

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.

IBM

Modernizing Data Protection
Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.

Forcepoint

Rosen Hotels Elevates Guest Experience with Team Communications
Watch this brief case study to find out how Rosen Hotels updated their unified communications and upgraded from legacy analog technology to more modern radios, leveraging a more secure, robust network.

Motorola, Inc.

IT Connects Customers to Brands
Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.

Cisco Systems, Inc.

Unified Data Protection for Hybrid IT, Part 2
In part two of the Unified Data Protection for a Hybrid IT World webinar series, take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint can help you meet your data protection needs.

Forcepoint

Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.

WANdisco

Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
Watch this upcoming webinar to learn the essential components needed to defend your business against the top 5 attack vectors we see in a Cyber Security Operations Center (SOC).

Arctic Wolf

Home Suite Home
This videocast exemplifies a unified communications system that enables companies to experience real-time business communications solutions that allow them to collaborate in any mode they want—voice, video, email, or IM—on virtually any device they want.

Avaya
1 - 10 of 55 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement