IT Management  >   Systems Design and Development  >  

Information Technology Architectures

RSS Feed   
Information Technology Architectures Multimedia (View All Report Types)
 
Virtualizing Oracle with EMC and VMware
sponsored by EMC Corporation & VMware, Inc.
VIDEO: This session provides best practice and solution guidelines to successfully architect and deploy Oracle databases on the EMC and VMware platform.
Posted: 10 May 2011 | Premiered: 10 May 2011

EMC Corporation & VMware, Inc.

IBM Deployment Planning and Automation for cloud
sponsored by IBM
WEBCAST: Successful IT deployments are full of challenges. Without a central library of standard templates, every deployment has to start from scratch. IBM Deployment Planning and Automation for cloud accelerator helps create detailed deployment topology models and IBM Rational Asset Manager stores them as patterns. Learn more.
Posted: 09 Nov 2011 | Premiered: Nov 9, 2011

IBM

Help! The Applications Octopus is Strangling our Business! Is your business strangled by outdated applications and inflexible architectures?
sponsored by ASG Software Solutions
WEBCAST: This webcast shows insights into enabling businesses to  face business challenges by combining business driven information systems and effective application portfolio management.
Posted: 03 Nov 2010 | Premiered: Nov 16, 2010, 11:00 EST (16:00 GMT)

ASG Software Solutions

Overcome Alert Fatigue with Actionable Threat Intelligence
sponsored by Bitdefender
WEBCAST: Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.
Posted: 28 Jul 2020 | Premiered: Jul 28, 2020

Bitdefender

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.
Posted: 27 Jul 2020 | Premiered: 27 Jul 2020

SailPoint Technologies

Resolving the Gaps In Model-Driven Management - Introducing Nokia Service Router Linux
sponsored by Nokia
VIDEO: Whilst data center networks and their building blocks have evolved heavily over time to keep pace with growing infrastructure demands, the management plane and overall management architecture have been relatively late to the party. Update your agility. Watch this video to learn how to resolve gaps in model-driven management.
Posted: 24 Sep 2020 | Premiered: 09 Jul 2020

Nokia

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Endpoint Detection and Response
sponsored by Claranet
VIDEO: In this 6-minute webinar, tune into a discussion about the evolution of endpoint detection and response (EDR) – from niche monitoring tool to a staple for overworked IT and security teams.
Posted: 21 Aug 2020 | Premiered: 21 Aug 2020

Claranet

Connect, Enable and Protect Your Workforce
sponsored by IBM
WEBCAST: Although the massive shift towards remote work seemed like a temporary protocol at first, this new way of working looks to be the norm for the foreseeable future. Luckily, securing a remote workforce doesn’t require a massive restructure. Watch this webinar to see how IBM is helping organizations embrace the new normal.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

IBM

How to Leverage Endpoint Detection and Response (EDR) in AWS Investigations
sponsored by AWS & CrowdStrike
VIDEO: Digital transformation and the increased adoption of cloud capabilities has created additional challenges for organizations managing a growing number of endpoints – with security being the foremost challenge. Watch this webinar to join experts at AWS and SANS as they highlight these challenges and best practices for securing cloud endpoints.
Posted: 21 Aug 2020 | Premiered: 21 Aug 2020

AWS & CrowdStrike
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info