IT Agents  >   Standards Organizations  >   National Standards Organizations  >  

International Standards Organization

RSS Feed   
International Standards Organization Multimedia (View All Report Types)
 
Palo Alto Networks rockets resiliency by transforming IT
sponsored by ServiceNow
WEBCAST: Problem management is an IT service management process that follows the life cycle of underlying service problems. In this webinar, learn how Palo Alto simplified problem management processes using digital workflows and automation, and how you can do the same at your organization.
Posted: 09 Nov 2020 | Premiered: Nov 9, 2020

ServiceNow

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection
sponsored by IBM
WEBCAST: In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts.
Posted: 17 Sep 2009 | Premiered: Sep 24, 2009, 12:00 EDT (16:00 GMT)

IBM

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

IBM Application Security Solutions Demo
sponsored by IBM
SOFTWARE DEMO: IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
Posted: 22 Dec 2008 | Premiered: 19 Dec 2008

IBM

Managing the Transition to IFRS
sponsored by Oracle Corporation
PODCAST: Listen to this podcast with David Jones, Director at PWC, who has worked with multi-national companies across Europe helping them to make the transition to adopting IFRS and to improve their financial reporting in the process.
Posted: 21 Mar 2011 | Premiered: Mar 18, 2011

Oracle Corporation

VMware International Unlimited Company VIDEO 3
sponsored by VMware International Unlimited Company
WEBCAST: The growing diversity of assets makes it harder for IT audit professionals to assess the two key audit parameters - security and availability - of infrastructure, devices and services. But now, organizations can leverage enterprise technology orchestration to simplify this process. View 2 orchestration use cases to learn how it’s done.
Posted: 16 Apr 2021 | Premiered: Apr 16, 2021

VMware International Unlimited Company

VMware International Unlimited Company VIDEO 1
sponsored by VMware International Unlimited Company
WEBCAST: VMware Work from Anywhere solutions rapidly enable a remote workforce with enterprise performance and security, consumer simplicity, and cloud scale. In this webcast, Shefali Chinni and Travis Carlson discuss how VMware IT deployed VMware SD-WAN to mitigate the issues of network and application performance for its own employees.
Posted: 15 Apr 2021 | Premiered: Feb 28, 2021

TOPICS:  WAN | WAN Hardware
VMware International Unlimited Company

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services

Mitigating Insider Threats
sponsored by IBM
WEBCAST: This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.
Posted: 14 Aug 2013 | Premiered: Aug 14, 2013

IBM

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
sponsored by WANdisco
WEBCAST: Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
Posted: 23 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Are Your Apps in the Race to Win?
sponsored by WhiteHat Security
WEBCAST: For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.
Posted: 11 Dec 2020 | Premiered: Dec 11, 2020

WhiteHat Security

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute

Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST: Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

WhiteHat Security

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Cisco Secure Remote Access Solution
sponsored by Cisco Systems, Inc.
SOFTWARE DEMO: This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
Posted: 08 Jul 2008 | Premiered: 01 Jul 2008

Cisco Systems, Inc.

Data Exchange & Event Processing for Oracle EBS
sponsored by STR Software
VIDEO: Oracle E-Business Suite users can now control the transfer and processing of data from within the familiar EBS forms interface.  In this short video you will experience how a standardized process allows EBS users to become self-sufficient in the transfer of data to and from EBS and other systems, internally and externally to your IT environment. 
Posted: 19 Oct 2010 | Premiered: 19 Oct 2010

STR Software

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST: SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

Webcast: Why Choose IBM for Your Desktop Alternative and Collaboration Software
sponsored by IBM Software Group
WEBCAST: Learn how the IBM collaboration software portfolio is being transformed with Web 2.0, social networking and unified communications capabilities.
Posted: 28 Nov 2007 | Premiered: Sep 26, 2007

IBM Software Group

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

That's why you should consider a managed private cloud!
sponsored by HP & Intel®
WEBCAST: Organizations are experiencing challenges with internal cloud deployments, which is why the alternative private cloud system is the best solution to this problem.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

HP & Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences