IT Management Multimedia
-
The Biggest IT challenge in 2020 is coming from the board room
Sponsored by: Veeam SoftwareIt is important to understand what causes business unit and IT disconnects in order to make sure your organization has defined expectations and ultimately improves their backup strategy. Watch this webcast to learn about the industry trends that are causing the gap and how those expectations are driving 2020 challenges and strategy.
-
The Atlassian Approach to Incident Management
Sponsored by: AtlassianAs demands for always-on service availability continue to compound, intuitive incident management tools are worth their weight in gold. Jump into this webinar from Atlassian to learn how their Incident Management tool can improve ITOps workflows, quickly integrate into DevOps processes, and more.
-
How to Save Your Failing IT Projects and Deployments
Sponsored by: GoliathTune into this half-hour webinar to learn how proactive monitoring and troubleshooting tools can keep your IT deployments running smoothly – and can prevent IT projects from failing.
-
HOL: Containerized Development with Docker
Sponsored by: Oracle CorporationThe emergence of container development has provided IT teams a real solution to consolidate on-premise applications within virtual machines Follow this virtual workshop to understand how your business can realistically implement containers and improve application efficiencies.
-
ITSM and Digital Transformation – Where Are We?
Sponsored by: ServiceaideHear from ITSM and IT automation experts as they discuss the impending evolution of ITSM under the pressures of digital transformation – and how technology like AI, machine learning, and process automation will become crucial to a successful IT service strategy.
-
IT Priorities 2018 - What's happening in security?
Sponsored by: ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
-
IT Priorities 2018 - What are UK IT managers spending their budgets on?
Sponsored by: ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, talks us through the key areas that IT managers in the UK are planning on spending their budgets on. Results and statistics are taken from Computer Weekly's 2018 IT Priorities survey in which over 250 IT decision makers took part.
-
Al Powers Smarter Investment Decisions - Intel Chip Chat
Sponsored by: Intel and GoogleListen to this Intel Chip Chat podcast to learn how a natural language interface used on Intel® Xeon® Scalable processors available on Google Cloud Platform can help financial institutions make more informed decisions.
-
IBM MaaS360 with Watson Advisor
Sponsored by: IBMWatch this video to see how IBM MaaS360 with Watson Advisor brings risk exposures, opportunities, and information front and center for IT professionals.
-
On-Demand Analytics Webinar
Sponsored by: IBMWatch an IBM webinar to learn how you can put your most valuable data to work in analytics.
-
ASICS EMEA Hits the Ground Running with Cloud-Based Mobility Solution
Sponsored by: MicrosoftWatch this video to learn how everyone at ASICS is in better shape to help the company attain its goal to become the number one brand for the sports enthusiast by using the Microsoft Enterprise Mobility + Security (EMS) solution.
-
Mosaic Uses SAP on Azure to Help the World Grow the Food it Needs
Sponsored by: MicrosoftWatch this video to learn how The Mosaic Company turned to Microsoft Azure to get the most out of its SAP system and to Capgemini as its systems integrator.
-
Stop Living in the Past: A New Approach to Application Security
Sponsored by: Veracode, Inc.This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.
-
Your Path to a Mature AppSec Program
Sponsored by: Veracode, Inc.This webcast outlines the steps most of Veracode's customers take to develop a mature application security program and provides more information on mature AppSec programs.
-
The ROI of AppSec: Getting your Money's Worth from Your AppSec Program
Sponsored by: Veracode, Inc.This video will take a look at the real costs of fixing vulnerabilities and how to maximize the ROI of your application security program.
-
Be the Champion of Security in a DevOps World
Sponsored by: Veracode, Inc.Watch this Infosecurity Magazine webinar to learn how to become a champion of security with DevOps.
-
Securing the Enterprise in a DevOps World: Keynote & Panel
Sponsored by: Veracode, Inc.Watch this roundtable discussion about the pitfalls and successes of the DevOps initiative organizations run into and much more.
-
You Can Get There From Here: The Road to Secure DevOps
Sponsored by: Veracode, Inc.In this webcast, learn a basic understanding of Waterfall, Agile and DevOps from a people, process and technology point of view, how Security can best be integrated into DevOps and more.
-
Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
Sponsored by: Veracode, Inc.Watch this webcast to learn five key factors of building code securely from the beginning.
-
Getting Started with Secure DevOps
Sponsored by: Veracode, Inc.Watch this video to learn how DevOps can impact security and how to make the development process secure as well.
-
Vident Health: More Than the Sum of its Parts
Sponsored by: McAfee, Inc.Find out how Vident Health overcame alert overload and enabled an innovative, patient-focused environment.
-
Kinetic IT
Sponsored by: McAfee, Inc.Hear from Kinetic IT's Security Service Director on the successful fourteen year partnership with McAfee.
-
Evolution of the Security Operations Center
Sponsored by: McAfee, Inc.Hear an overview on how SOC is defined within the industry, a history of SOCs and model options for your organization.
-
Defeat the Grey
Sponsored by: McAfee, Inc.Find out how to cut through mountains of grey to actionable information that improves response time and efficiency.
-
Reduce Insider Threats Risk Through End User Empowerment
Sponsored by: McAfee, Inc.Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.