ComputerWeekly.com Research Library

Powered by Bitpipe.com

IT Management Multimedia

  • Making the Most of Shadow IT

    Sponsored by: Atlassian

    Tune in to this webinar to learn experts from Atlassian discuss the frameworks and processes that Atlassian's own IT teams use to maintain security protocols while also enabling individual departments to control their own software and tools.

  • Empower Your Security Analysts

    Sponsored by: McAfee

    Are you looking to drive SOC efficiency? Are you seeking greater automation, threat hunting and endpoint visibility and control than your current solution delivers? Watch this webcast to go in-depth on security operations with a focus on alert quality, SOC efficiency and securing endpoints at scale.

  • Technical Managing Commercial and Custom Applications in a Hybrid Environment

    Sponsored by: SolarWinds, Inc.

    Access this white paper to learn the 6 key challenges facing application monitoring, discover the SolarWinds solutions designed to help, and watch demos that show them in action.

  • Simplify Your IT Infrastructure Management with SolarWinds

    Sponsored by: SolarWinds, Inc.

    In today’s rapidly changing IT software landscape, 29% of IT teams’ digital bandwidth is spent dealing with digital performance issues—to the tune of $2.5 million annually. Watch this video to learn how SolarWinds’ IT Operations Management can help you reduce this wasted time and money with better monitoring, security, management, and more.

  • Techflix: Empowering Developers

    Sponsored by: Sogeti

    DevOps is a crucial part of digital transformation; but many businesses don’t understand the differences between DevOps and Enterprise DevOps. Watch this webinar to see how DevOps at scale presents new challenges to companies and learn how you can navigate these challenges with the right tools and strategies.

  • Data Storage Cost Containment Strategies

    Sponsored by: Iron Mountain

    Check out this webcast to hear a discussion about storage cost containment strategies, how to better manage growing data volumes while maximizing IT budgets, the challenges facing legacy data’s role on the journey to cloud modernization, and more.

  • Don't be Afraid of Cloud Security

    Sponsored by: Apcela

    The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.

  • Enabling the Remote Workforce

    Sponsored by: Cox Communications, Inc.

    Recently Microsoft has reported a 775% increase in cloud-based remote work services—a fact that highlights the resounding need for organizations to adapt to cloud-enabled work demands. Dive into this webinar to learn more about the shifting paradigm of cloud-based remote work—and how to catch your organization up to speed.

  • Can Your CIAM Solution Keep Up with the Market?

    Sponsored by: Okta

    Organizations must now respond to increasingly complex requirements to deliver seamless omnichannel experiences for their customers. But they must also work harder to keep sensitive customer data secure. To take customer security to the next level, view this webcast to learn more about customer identity access management.

  • Webinar: DevOps to NoOps

    Sponsored by: Dynatrace

    In 2004, Dynatrace was asked what monitoring will look like in 2020. Even then, they knew that monitoring needed a transformation larger than the product itself. Now, hear from Dynatrace’s CTO Bernd Greifeneder as he discusses the changing world of monitoring, and how software management, deployment, and support has changed with it.

  • Expert Advice to Enable Remote IT Access

    Sponsored by: Vertiv

    In this webinar, Vertiv experts will discuss how to prepare for business continuity when physical access to critical resources is restricted and how to allow access to IT infrastructure from anywhere at any time.

  • Email Security Threats: How to Protect Your Business, People and Data

    Sponsored by: Barracuda

    Every organization is challenged by email security. Rogue actors are increasingly using email to target employees and system administrators with a growing range of threats and techniques – and detection has become more difficult as a result. Stay up to date by viewing this webcast on the latest email security threats and how to defend from them.

  • Webinar: Expert Advice for Integrating a 4G LTE Out-of-Band Network

    Sponsored by: Vertiv

    Disruption is a significant contributor to the deterioration of an organization’s ability to operate at peak efficiency. Therefore, IT organizations need to build a resiliency plan to help mitigate those disruptions. In this webinar, learn how the latest out-of-band technologies can deliver 24/7 access even when your network goes down.

  • Barriers to IT Modernization and How to Overcome Them

    Sponsored by: Insight

    Your IT team knows that modernization is fundamental to meet the demand for agility and efficiency. Unfortunately, your team also knows that IT modernization is much more easily said than done. Explore the 4 key barriers to IT modernization—and learn how to overcome them—in this walkthrough.

  • Berry Global, the “Game Changer,” Manages Their IT with baramundi

    Sponsored by: Baramundi

    When packaging industry leader Berry Global wanted to ensure that their IT systems were on the same level as their product, they turned to baramundi’s Unified Endpoint Management. Watch this video to hear from Berry company leaders themselves on how baramunid simplified and improved their endpoint and IT management processes.

  • Post-Pandemic- 9 stages to take back control of your assets

    Sponsored by: Livingstone Tech

    COVID-19 has changed the way businesses operate. While many of these operational changes have helped keep businesses afloat throughout this crisis, other temporary strategies have scattered IT. It’s time to take control of IT again. Learn about the 9 stages you can take to get back in control of your assets post-pandemic in this video.

  • Beyond COVID-19 Webinar

    Sponsored by: Hyperproof

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

  • RE:IMAGINE Executive Briefing Session

    Sponsored by: Habour IT

    Tune into this RE:IMAGINE session to hear CIOs and leaders from powerhouse technology vendors—including Microsoft, NetApp, Palo Alto, and Cisco—as they discuss strategies for developing and executing against new IT challenges in a post-COVID world.

  • Webinar: Succeeding at digital business in the new normal: why application and infrastructure monitoring is more essential than ever

    Sponsored by: Dynatrace

    Monitoring demands have changed significantly this year. In fact, since the pandemic began, 57% have or expect increased strain on IT resources. Tune in as experts from 451 Research and Dynatrace discuss the pandemic’s impact on IT and DevOps environments and explore the best ways to overcome the monitoring challenges that have arisen.

  • Security and compliance for the enterprise

    Sponsored by: Atlassian

    Tune into this discussion with a panel of leaders from Atlassian as they weigh-in on their strategies for shaping and scaling Atlassian’s own security, compliance, and reliability methodologies.

  • Customer Voice: Adopting a Culture-First Approach to Accelerating Innovation

    Sponsored by: Red Hat

    Watch this Red Hat webinar to learn how to institute a culture of innovation and agility in your company from the top down.

  • Ivanti Neurons for Healing - Demo

    Sponsored by: Ivanti ANZ

    IT departments often have to place large, important projects on the backburner as they respond to menial and repetitive, but necessary, tasks. Watch this short demo to see Ivanti’s self-healing Neurons platform automate and alleviate repetitive tasks and free up IT time to be spent on more valuable tasks.

  • Jeff Abbott & Nayaki Nayyar, Ivanti CUBE Conversation, July 2020

    Sponsored by: Ivanti ANZ

    When choosing an endpoint management solution, you often have to choose between UEM and service management—and end up paying for both. Check out this Ivanti webinar, featuring President Jeff Abbott and Chief Product Officer Nayaki Nayyar, to learn why Ivanti is a leader in endpoint management and what their new executive team is planning.

  • Tips & Best Practices for your Negotiation Strategy

    Sponsored by: Livingstone Tech

    Did you give yourself enough lead time to plan your IBM road map and decide on your ELA strategy? Livingstone Tech recently sat down with 2 IBM experts to discuss some of the key considerations and best practices to help ensure your negotiation strategy is successful. Watch the 30-minute webinar to learn more.

  • CUBE Conversation: Ivanti discusses partnership with Intel

    Sponsored by: Ivanti ANZ

    View this video to hear Nayaki Nayyar, EVP and CPO of Ivanti and Stephanie Hallford, VP & GM of Business Client Platforms at Intel Corporation as they sit down with Lisa Martin of The Cube to discuss Ivanti’s new hyper-automation platform and their accompanying partnership with Intel.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.