IT Agents  >   Industry Organizations  >  

Internet Industry Organizations

RSS Feed   
Internet Industry Organizations Multimedia (View All Report Types)
25 Matches
The Role of Storage and VDI in Healthcare
sponsored by Pure Storage
WEBCAST: Tune in to this webcast now to learn how to overcome the challenges of implementing desktop virtualization in your healthcare organization, providing your clinicians with faster, more secure access to stored patient information.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Impact of Using Flash Storage in Your EHR Environment
sponsored by Pure Storage
WEBCAST: This webcast chronicles how all-flash storage was able to greatly improve the performance of one medical center's sluggish EHR and VDI environments. Access now to learn about different use cases for flash storage, and how to identify the technology that is right for your organization.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Mastering Data Intelligence with Open Technology Innovation
sponsored by IBM
WEBCAST: Find out how financial organizations can overcome big data challenges with modern, open source Hadoop data management platforms so that they can drive up the value of their business intelligence.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

IBM

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco Umbrella
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco Umbrella

Transforming Technology Delivery in Healthcare with Virtualization
sponsored by Citrix and Pure Storage
VIRTUAL SEMINAR: Tune in to hear technology leaders from the nation's leading health systems discuss how technology is reshaping care delivery and security.
Posted: 04 Nov 2016 | Premiered: 09 Nov 2016

Citrix and Pure Storage

Flash Storage: A Health IT Panel
sponsored by Pure Storage
WEBCAST: Epic is encouraging all customers to move to all-flash storage by 2020. Even if Epic is not your EHR provider, your vendor may follow suit. In this panel discussion, health IT pros discuss the results they have seen from using flash to run their EHR environments.
Posted: 09 May 2016 | Premiered: May 9, 2016

Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

HealthEdge Advice to Peers: Real-World Examples
sponsored by HealthEdge
VIDEO: Health plan leaders who implemented HealthEdge -- a core administration and care coordination system for transformative health plans – spoke about their experiences.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

New Roles and Opportunities for Payers
sponsored by HealthEdge
VIDEO: Learn about the opportunities that payers have with better technology and information systems, and how to bend the cost curve of healthcare while building a loyal relationship with patients along the way.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

The Tipping Point: Return on Investment
sponsored by AGFA Healthcare
VIDEO: The financial ramifications of a major IT investment such as enterprise imaging are significant. And in order to get C-suite approval, the benefits and ROI must be carefully analyzed. This video reveals a study by HIMSS Europe detailing how hospitals have been able to improve their delivery of quality care while realizing financial savings.
Posted: 12 Feb 2018 | Premiered: 17 Oct 2017

AGFA Healthcare

The Tipping Point: Value Based Care
sponsored by AGFA Healthcare
VIDEO: It's a common misconception that enterprise imaging is strictly about moving the storage of patient's images from the PACs to the VNA. This is 1 of 6 primary components to evaluating enterprise imaging maturity. In this video, Kim Garriott from Logicalis Healthcare Solutions discusses a recent study about making imaging more accessible.
Posted: 11 Feb 2018 | Premiered: 17 Oct 2017

AGFA Healthcare

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Mainstreaming Docker Containers with Persistent Storage
sponsored by Hewlett Packard Enterprise
WEBCAST: Join presenters from Docker and Nimble Storage as they dig into the common pitfalls and challenges associated with managing apps that require persistent storage for containers, including the crucial role of cloud-ready flash arrays. Tune in to learn how to provide private copies of production data with zero copy clones, and more.
Posted: 22 Mar 2018 | Premiered: Mar 22, 2018

Hewlett Packard Enterprise

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Change Agents in the Cybersecurity Era
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Take advantage of this opportunity and join our experts in staying up to date with cybersecurity's most pressing topics.
Posted: 13 Mar 2018 | Premiered: Mar 12, 2018

SearchSecurity.com

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID Global
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID Global
25 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement