IT Management  >   Systems Design and Development  >  

Information Technology Architectures

RSS Feed   
Information Technology Architectures Multimedia (View All Report Types)
 
IBM Deployment Planning and Automation for cloud
sponsored by IBM
WEBCAST: Successful IT deployments are full of challenges. Without a central library of standard templates, every deployment has to start from scratch. IBM Deployment Planning and Automation for cloud accelerator helps create detailed deployment topology models and IBM Rational Asset Manager stores them as patterns. Learn more.
Posted: 09 Nov 2011 | Premiered: Nov 9, 2011

IBM

Help! The Applications Octopus is Strangling our Business! Is your business strangled by outdated applications and inflexible architectures?
sponsored by ASG Software Solutions
WEBCAST: This webcast shows insights into enabling businesses to  face business challenges by combining business driven information systems and effective application portfolio management.
Posted: 03 Nov 2010 | Premiered: Nov 16, 2010, 11:00 EST (16:00 GMT)

ASG Software Solutions

Virtualizing Oracle with EMC and VMware
sponsored by EMC Corporation & VMware, Inc.
VIDEO: This session provides best practice and solution guidelines to successfully architect and deploy Oracle databases on the EMC and VMware platform.
Posted: 10 May 2011 | Premiered: 10 May 2011

EMC Corporation & VMware, Inc.

How to Architect a Secure Remote Access Solution Without Sacrificing Performance
sponsored by ThousandEyes
WEBCAST: The COVID-19 pandemic brought on a seismic shift in the way enterprises work and where employees connect from — prompting enterprise IT to quickly scale and update VPN access to cope with increased usage. In this webinar, learn how ThousandEyes remote workforce solution enables IT teams to architect a solution without compromising on performance.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021


Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security

Building High Performance Secure NextGen Transit
sponsored by Aviatrix Systems
WEBCAST: In this TechTalk, dive deep into how you can enable your organization to leverage a next generation global transit backbone that is intelligent, automated, secure and high performing with zero compromise on functionality and network visibility.
Posted: 26 Jan 2021 | Premiered: Jan 26, 2021

Aviatrix Systems

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

Introduction to DNSDB Part 2: Walk
sponsored by Farsight Security
WEBCAST: Many people on the internet behave in a way that can be considered ‘unaccountable.’ Some may even use a proxy to hide their true identity. Find out how to see through the smokescreen and pin down the truly bad domains in this DNSDB webinar.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

Farsight Security

Keeping Remote Workers Safe Webcast
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences