WEBCAST:
Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
VIDEO:
Check out this brief video to see how HP Network Solutions based on an industry standard ProCurve infrastructure can help assure return on IT investments by developing best-in-class solutions for your business.
WEBCAST:
IBM Service Management can help IT organizations deliver service excellence, through a structured approach that can enable better governance and help manage risk, delivering business value. Watch this video to learn how you can deliver quality ...
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
WEBCAST:
Corporations worldwide rely on archiving as a best practice to control costs, improve service levels and automate data retention across multiple business areas.
Posted: 05 Feb 2007 | Premiered: Feb 15, 2007, 14:00 EST (19:00 GMT)
PODCAST:
In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
SOFTWARE DEMO:
Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
WEBCAST:
Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
WEBCAST:
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.