IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

White Hat Hackers

RSS Feed   
White Hat Hackers Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Yahoo Mail Reduces Testing Time by 86%
sponsored by Sauce Labs
WEBCAST: Watch this short clip to see how Yahoo Mail integrated with Sauce Labs and decreased overall testing time from three hours to just 25 minutes.
Posted: 26 Mar 2018 | Premiered: Feb 29, 2016

TOPICS:  Testing
Sauce Labs

Juniper Networks vSRX Virtual Firewall
sponsored by Juniper Networks
VIDEO: Do you want to ensure secure connectivity and protection for your Azure workloads? A virtual firewall may be the answer your enterprise is seeking. Learn more about a Next-Generation Firewall solution on Azure can upgrade your enterprise's security capabilities.
Posted: 10 Apr 2018 | Premiered: 09 Apr 2018

Juniper Networks

Server Migration Made Easy: 15 Minute Demonstration
sponsored by Tech Data - MicroFocus
VIDEO: With the ever-increasing scalability and innovation of the cloud, migration future-proofs your workloads. And now, migrations are easier than ever. In this demonstration video, learn about the planning and automation capabilities of a cloud migration platform and what it can offer your enterprise.
Posted: 26 Apr 2018 | Premiered: 20 Jul 2017

Tech Data - MicroFocus

The Importance of B2B Integration
sponsored by IBM
VIDEOCAST: IDC analyst Chandana Gopal explains why the LOB is critical in helping create a modernized B2B architecture.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Stop Living in the Past: A New Approach to Application Security
sponsored by Veracode, Inc.
WEBCAST: This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

Health Insurance Provider Transforms Their Data Platform
sponsored by IBM
VIDEO: James Wade of Florida Blue discusses the solutions that helped reduce hold times and eliminate fraud.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

New Technology for Data Driven Analytics Results
sponsored by IBM
WEBCAST: Hear how new analytics technology creates opportunity for greater insights, while reducing complexity and cost.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Putting Managed File Transfer in Perspective
sponsored by IBM
WEBCAST: Think about these two themes as you adapt your managed file transfer initiatives to grow with current technology trends.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement