Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO:
Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007
Cascading Risk
sponsored by Core Security Technologies
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)
Visual Digital Platforms: Crucial Technology to Eliminate Poverty
sponsored by Hewlett-Packard Enterprise
VIDEO:
See how Foundation Paraguay helps thousands of families overcome poverty with digital services and a bottom-up approach.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017
How Shipping Tech Firm Delivers Performance to Customers
sponsored by NetApp
VIDEO:
All-flash storage drives growth, protects customer data and meets customer needs at a U.S. postal partner.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016
Build a Lean Cloud Based Security Operations Center
sponsored by Splunk
WEBCAST:
Discover how Travis Perkins protected the organization while moving an on-premise legacy SOC to a lean SOC in the cloud.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016
Disaster Recovery-as-a-Service to the Rescue
sponsored by Hewlett-Packard Enterprise
VIDEO:
Learn how Veritas and HPE closed disaster recovery gaps with systems that quickly restore operations at a low cost.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016
SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST:
Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017
IBM LinuxONE Total Cost of Ownership Calculator
sponsored by IBM
WEBCAST:
In just a few minutes learn how much you can save with a personalized TCO estimate.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017
Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO:
Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017
Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO:
Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017