Homeland Security Multimedia

(View All Report Types)
Get Quick & Easy Access to IT Staffing with IM Link
sponsored by Ingram Micro
WEBCAST: This webcast covers an IT staffing service that will help fill in the holes in your understaffed IT department however you need it, and without breaking the bank.
Posted: 12 Dec 2013 | Premiered: Oct 25, 2013

Ingram Micro

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
VIDEO: Watch this video to learn how DevOps can impact security and how to make the development process secure as well.
Posted: 17 Jan 2018 | Premiered: 17 Jan 2018

TOPICS:  IT Management
Veracode, Inc.

GFI MAX Building Blocks & MSP University Podcast
sponsored by GFI Software
PODCAST: This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.
Posted: 10 Dec 2010 | Premiered: Dec 10, 2010

GFI Software

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Going Crazy Without File Type Association?
sponsored by Dell
VIDEO: File type association is essential. Watch how it can help your employees save time—and maybe even their sanity.
Posted: 28 Jan 2015 | Premiered: 28 Jan 2015

TOPICS:  IT Management
Dell

Health Insurance Provider Transforms Their Data Platform
sponsored by IBM
VIDEO: James Wade of Florida Blue discusses the solutions that helped reduce hold times and eliminate fraud.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

Healthcare Networking Classroom
sponsored by TechTarget Health IT
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

TechTarget Health IT

HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID Global

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

High Performance Graphics for Virtual Desktops
sponsored by NVIDIA VMware
VIDEO: Graphics-rich apps are more popular than ever—but they require better VDI. Learn about the best offerings on the market.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management
NVIDIA VMware

Hightail Chooses IBM for Storage That Grows With Its Data
sponsored by IBM
WEBCAST: Learn how Hightail reduced costs, increased storage and cut power consumption by 30% with IBM Cloud Object Storage.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Vantara
SOFTWARE DOWNLOAD: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 13 Nov 2009 | Premiered: 12 Nov 2009

Hitachi Vantara

Hitachi IT Operations Analyzer Software
sponsored by Hitachi Vantara
TRIAL SOFTWARE: Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
Posted: 19 Aug 2009 | Premiered: 01 Aug 2009

Hitachi Vantara

How a Unified Data Cloud Boosts Simplicity and Intelligence for Better Business Outcomes
sponsored by Google Cloud & AMD
WEBCAST: Watch this webinar to hear from a panel of experts from IDC, Google Cloud, and partners discuss how they are putting data, analytics, and the power of artificial intelligence to work via the cloud.
Posted: 20 Dec 2022 | Premiered: Dec 20, 2022

TOPICS:  IT Management
All resources sponsored by Google Cloud & AMD

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

How High-Performance Storage Drives Competitive Advantage
sponsored by NetApp
VIDEO: A managed backup provider describes how its solution lets it scale linearly and segment clouds the way it wants to.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

How LexisNexis Empowers Its Service Team
sponsored by Oracle Corporation
WEBCAST: Find out how LexisNexis keeps customers happy and empowers employees with simpler interfaces on mobile and desktop.
Posted: 28 Jan 2016 | Premiered: Jan 28, 2016

TOPICS:  IT Management
Oracle Corporation

How Many Clicks Does It Take to Get to the Center of VDI?
sponsored by Dell, Inc. and Intel®
WEBCAST: How many tasks can one platform automate? Learn about comprehensive solutions simple enough for any organization to use.
Posted: 16 Sep 2015 | Premiered: Sep 16, 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

How One Solution Handled Federal Government Security Demands
sponsored by Riverbed Technology, Inc.
WEBCAST: The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

How Shipping Tech Firm Delivers Performance to Customers
sponsored by NetApp
VIDEO: All-flash storage drives growth, protects customer data and meets customer needs at a U.S. postal partner.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

How the Global Nature of Threats Impacts Security
sponsored by Dimension Data
WEBCAST: Cyberthreats are more sophisticated than ever. Learn why managed security services have become crucial to stay safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

How to Bring Business Continuity (BC) to the Branch
sponsored by Riverbed Technology, Inc.
WEBCAST: Continuity is for more than data centers. Learn how to extend BC to remote branches, and how this prevents catastrophe.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

How to Enforce Limits Without Location-Based Security
sponsored by Dell
VIDEO: Location-based security makes things easier for your business. Find out what you may have to resort to without it.
Posted: 28 Jan 2015 | Premiered: 28 Jan 2015

TOPICS:  IT Management
Dell

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

How to Make Virtual Desktop Security Simpler and More Scalable
sponsored by Citrix
WEBCAST: It is essential to provide a secure and scalable IT environment. But realize that traditional security methods may not be able to fully protect your virtual desktop environment. Explore effective strategies that can make virtual desktop security simpler and more scalable, while protecting and providing flexible IT delivery methods to end-users.
Posted: 26 Apr 2011 | Premiered: Apr 25, 2011

Citrix