Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed   
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement Programs Multimedia (View All Report Types)
126 - 150 of 179 Matches Previous Page  |  Next Page
Strengthen Your Ransomware Strategy
sponsored by AdvizeX Technologies
WEBCAST: Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.
Posted: 31 Jul 2017 | Premiered: Jul 17, 2017

AdvizeX Technologies

The Denial of Service Underground: DDoS Perpetrators and Attacks Exposed
sponsored by Imperva
WEBCAST: According to Imperva, there will be 75 billion connected devices by 2020. Take a look at this webcast to gain insight into the growing threat of DDoS attacks targeting devices, how they work and who is behind them.
Posted: 23 Feb 2018 | Premiered: Feb 23, 2018


The Future of Privileged Management
sponsored by One Identity
VIDEO: The numbers of privileged accounts are growing as everything and everyone is becoming more and more connected. Key into this webcast to learn where privileged management is heading and uncover an approach to securing privileged accounts.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

The GDPR: A Rule to Rule Them All
sponsored by RSA Conference
WEBCAST: According to the GDPR, organizations must ensure "appropriate security and confidentiality of the personal data". This webcast explores the new requirements for data breach notifications with the GDPR and what your organization should be doing to comply.
Posted: 20 Mar 2018 | Premiered: Mar 20, 2018

RSA Conference

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk
sponsored by One Identity
WEBCAST: In this webcast, learn 5 ways to identify areas of risk before a user can abuse their access rights.
Posted: 19 Feb 2018 | Premiered: Feb 14, 2018

One Identity

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013


Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017


Strategies for Driving Operational Efficiency and Reducing Costs
sponsored by Cisco Systems, Inc.
PODCAST: Find out how Jeremy Gill, CIO, Michael Baker Corporation, is using technology to optimize processes while delivering cost savings and superior customer service.
Posted: 16 Mar 2011 | Premiered: Mar 16, 2011

Cisco Systems, Inc.

Stronger Business Insights for Finance Leaders
sponsored by IBM
VIDEO: This brief video considers one system that sheds light business performance metrics, with particular focus on analytics and business intelligence. Watch now to see if a system like this can help your senior executives steer your business down the right path.
Posted: 16 Dec 2015 | Premiered: 16 Dec 2015


Sybase IQ 15: More Flexibility to Adapt and Grow
sponsored by Sybase, an SAP company
WEBCAST: Please join Bill Jacobs, Director of Technical Marketing, Sybase IQ, in this webcast about the first of seven topic areas – as he discusses the new features added to Sybase IQ 15 that enhance the flexibility of Sybase IQ 15 for analytics, reporting and business intelligence applications.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Sybase IQ 15: Smarter Analytics
sponsored by Sybase, an SAP company
WEBCAST: Businesses today are facing a very different kind of competition that is rooted in extensive data analysis and demonstrated in decision making that is fast, comprehensive, and based on factual information. In this environment, Sybase IQ shines as a highly optimized analytic server.
Posted: 31 Aug 2009 | Premiered: Aug 1, 2009

Sybase, an SAP company

Sybase Video: Complex Event Processing for Continuous Intelligence
sponsored by Sybase, an SAP company
VIDEO: Discover how Sybase uses Complex Event Processing to help financial services companies capitalize on critical opportunities as they happen. This real-time Continuous Intelligence delivers actionable insights to enable informed decisions that can increase revenue, solve customer problems and reduce risk.
Posted: 08 Jul 2011 | Premiered: 08 Jul 2011

Sybase, an SAP company

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST: This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014


The "Hard Truths" About Managing Administrative and Application Identities
sponsored by Cyber-Ark Software
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

Cyber-Ark Software

The Anatomy of an Archiving Project
sponsored by Princeton Softech
WEBCAST: Corporations worldwide rely on archiving as a best practice to control costs, improve service levels and automate data retention across multiple business areas.
Posted: 05 Feb 2007 | Premiered: Feb 15, 2007, 14:00 EST (19:00 GMT)

Princeton Softech

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010


The Many Benefits of Lean IT
sponsored by Cisco Systems, Inc.
VIDEO: Can a leaner approach to IT deliver greater value at lower cost? Flextronics' CIO David Smoley reveals how a lean approach to IT, similar to successful methods used in manufacturing, delivers greater value to organizations and their customers.
Posted: 20 Sep 2010 | Premiered: 20 Sep 2010

Cisco Systems, Inc.

The Mobile App Top 10 Risks
sponsored by Veracode, Inc.
WEBCAST: This expert webcast reveals the top 10 mobile application risks facing organizations today.
Posted: 15 Feb 2011 | Premiered: Feb 15, 2011

Veracode, Inc.

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

The ROI of Database Archiving
sponsored by IBM
WEBCAST: This webcast explores how data archiving will enable you to improve the performance of mission critical applications and databases, control infrastructure costs and support sound data governance.
Posted: 03 Jun 2008 | Premiered: Jun 19, 2008, 14:00 EDT (18:00 GMT)


Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security

Top four considerations for securing Microsoft SharePoint
sponsored by Sophos
WEBCAST: This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets.
Posted: 08 Mar 2011 | Premiered: Mar 8, 2011

126 - 150 of 179 Matches Previous Page    4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement