Customer Data Privacy Multimedia

(View All Report Types)
How Sales and Marketing Can Thrive on Real Purchase Intent
sponsored by TechTarget
WEBCAST: More than half of B2B brands say they rely on purchase intent data, yet research suggests most marketers lack access to the people actually exhibiting intent. Watch this video to see how TechTarget’s publisher-based model provides access to the active, opted-in prospects you need to hit your KPIs and grow your business.
Posted: 08 Feb 2021 | Premiered: Apr 9, 2020

TechTarget

Webinar: Who You Gonna Call?
sponsored by TechTarget
WEBCAST: Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.
Posted: 08 Feb 2021 | Premiered: Jun 1, 2020

TechTarget

Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?
sponsored by Dell Software
WEBCAST: This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!
Posted: 29 Jun 2009 | Premiered: Jun 26, 2009

Dell Software

MapXtreme Java v4.8.1
sponsored by MapInfo Corporation
TRIAL SOFTWARE: This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.
Posted: 10 Mar 2008 | Premiered: 10 Mar 2008

MapInfo Corporation

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Lowering Risk by Applying Consistent Security Across All of Your Locations
sponsored by Juniper Networks, Inc.
WEBCAST: Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
Posted: 17 Jul 2009 | Premiered: Jul 17, 2009

Juniper Networks, Inc.

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software

Best Practices for Protecting Microsoft Exchange
sponsored by Symantec Corporation
WEBCAST: The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
Posted: 17 May 2006 | Premiered: Mar 23, 2006

Symantec Corporation