Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Administrative Law

RSS Feed   
Administrative Law Multimedia (View All Report Types)
 
Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

What's New in Group Policy Administrator 5.0
sponsored by SUSE
WEBCAST: Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
Posted: 09 Aug 2006 | Premiered: Apr 5, 2006

SUSE

NetIQ Security Solutions for iSeries Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

GFI FAXmaker for Exchange/SMTP/Lotus
sponsored by GFI Software
PRODUCT DEMO: Download this free trial of GFI Faxmaker to improve efficiency of business processes, provide backup for fax documents to increase compliance and help reduce time IT admins spend on fax errors.
Posted: 11 Oct 2007 | Premiered: 01 Oct 2007

GFI Software

Managing the Transition to IFRS
sponsored by Oracle Corporation
PODCAST: Listen to this podcast with David Jones, Director at PWC, who has worked with multi-national companies across Europe helping them to make the transition to adopting IFRS and to improve their financial reporting in the process.
Posted: 21 Mar 2011 | Premiered: Mar 18, 2011

Oracle Corporation

On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

Symantec Backup Exec™ System Recovery 7.0
sponsored by Symantec Corporation
PRODUCT DEMO: Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.
Posted: 14 Aug 2007 | Premiered: 01 Aug 2007

Symantec Corporation

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

IBM Information Lifecycle Management in Regulated Industries
sponsored by IBM
WEBCAST: Attend this Webcast, and listen as IDC's Research Director, Laura DuBois, discusses the issues around identifying and classifying information.
Posted: 18 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

IBM

Real Application Testing with Oracle Database 11g
sponsored by Oracle Corporation
WEBCAST: To help them stay ahead of the competition, agile businesses need to quickly adopt new technologies. Real Application Testing - with Oracle Database 11g - allows businesses to quickly do this while eliminating the risks associated with change.
Posted: 09 Dec 2008 | Premiered: Dec 9, 2008

Oracle Corporation

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

BlackBerry

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

Disk-Based Backup & Recovery
sponsored by Datalink Corp
WEBCAST: Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.
Posted: 03 Jan 2008 | Premiered: Jan 16, 2008, 12:30 EST (17:30 GMT)

Datalink Corp

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement