IT Risk Management Multimedia

(View All Report Types)
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
sponsored by EnterpriseDB Corporation
WEBCAST: Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)

EnterpriseDB Corporation

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

The Anatomy of an Archiving Project
sponsored by Princeton Softech
WEBCAST: Corporations worldwide rely on archiving as a best practice to control costs, improve service levels and automate data retention across multiple business areas.
Posted: 05 Feb 2007 | Premiered: Feb 15, 2007, 14:00 EST (19:00 GMT)

Princeton Softech