SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST:
Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016
Getting Started with Secure DevOps
sponsored by Veracode, Inc.
VIDEO:
Watch this video to learn how DevOps can impact security and how to make the development process secure as well.
Posted: 17 Jan 2018 | Premiered: 17 Jan 2018
The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST:
B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016
Transforming Education with Technology
sponsored by NetApp
WEBCAST:
See how one of the largest US public education systems uses technology to help students realize their full potential.
Posted: 31 Oct 2016 | Premiered: Oct 28, 2016
Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST:
Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017
Disaster Recovery-as-a-Service to the Rescue
sponsored by Hewlett-Packard Enterprise
VIDEO:
Learn how Veritas and HPE closed disaster recovery gaps with systems that quickly restore operations at a low cost.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016
New Technology for Data Driven Analytics Results
sponsored by IBM
WEBCAST:
Hear how new analytics technology creates opportunity for greater insights, while reducing complexity and cost.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017
Experience Dynamic Endpoint Threat Defense
sponsored by McAfee, Inc.
VIDEO:
Simplify your system and stay ahead of advanced threats with a collaborative framework that shares threat intelligence.
Posted: 10 May 2017 | Premiered: 10 May 2017
Stop Living in the Past: A New Approach to Application Security
sponsored by Veracode, Inc.
WEBCAST:
This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018
Road Map: The Data Security and Privacy Playbook
sponsored by IBM
WEBCAST:
Consider these five key characteristics when modernizing your legacy file transfer environment with MFT technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016