White Hats Multimedia

(View All Report Types)
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

Video: IT Priorities 2023 APAC
sponsored by TechTarget ComputerWeekly.com
VIDEO: Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023

TechTarget ComputerWeekly.com

Improving Operations with IT Automation
sponsored by Insight
VIDEO: With the help of automation, organizations can overcome these challenges for a variety of benefits. In this video, learn how offloading repeatable tasks from IT teammates can unleash strategic work and innovation for your business.
Posted: 15 Feb 2024 | Premiered: 15 Feb 2024

Insight

In Place Analytics for VSAM, ADABAS, DB2, IMS and more
sponsored by IBM
WEBCAST: Hear about the latest QMF enhancements and experience a demonstration of the self-service Business Analytics feature.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
VIDEO: Watch this video to learn how DevOps can impact security and how to make the development process secure as well.
Posted: 17 Jan 2018 | Premiered: 17 Jan 2018

TOPICS:  IT Management
Veracode, Inc.

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WEBCAST: This webcast outlines the steps most of Veracode's customers take to develop a mature application security program and provides more information on mature AppSec programs.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO: Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM