Ethical Hackers Multimedia

(View All Report Types)
Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Visual Digital Platforms: Crucial Technology to Eliminate Poverty
sponsored by Hewlett-Packard Enterprise
VIDEO: See how Foundation Paraguay helps thousands of families overcome poverty with digital services and a bottom-up approach.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

How Shipping Tech Firm Delivers Performance to Customers
sponsored by NetApp
VIDEO: All-flash storage drives growth, protects customer data and meets customer needs at a U.S. postal partner.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp

Build a Lean Cloud Based Security Operations Center
sponsored by Splunk
WEBCAST: Discover how Travis Perkins protected the organization while moving an on-premise legacy SOC to a lean SOC in the cloud.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Disaster Recovery-as-a-Service to the Rescue
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how Veritas and HPE closed disaster recovery gaps with systems that quickly restore operations at a low cost.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

IBM LinuxONE Total Cost of Ownership Calculator
sponsored by IBM
WEBCAST: In just a few minutes learn how much you can save with a personalized TCO estimate.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO: Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.