IT Priorities 2018 - What's happening in security?
sponsored by TechTarget ComputerWeekly.com
VIDEO:
In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 08 Feb 2021 | Premiered: 02 May 2018
B2B Integration for Healthcare: Don't Worry. Be Ready.
sponsored by IBM
WEBCAST:
Healthcare transformations are increasing B2B integration complexity. Prepare your organization with IBM architecture.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016
Best Practices for Securing SaaS with CASB
sponsored by McAfee, Inc.
VIDEO:
Listen to Securosis and McAfee discuss the challenges in cloud security and the benefits of agile security solutions.
Posted: 10 May 2017 | Premiered: 10 May 2017
Shape Your Best Cloud Strategy
sponsored by Splunk
WEBCAST:
Think about these four key factors to influence your cloud decisions.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016
Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST:
Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016
Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST:
Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017
Do You Effectively Manage Complex Data Transformation?
sponsored by IBM
VIDEO:
Discover how to manage transformation with a single solution as data flows through the enterprise.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017
Avoid Gridlock With a Flexible Infrastructure
sponsored by IBM
VIDEO:
Ensure your data center runs smoothly and supports the growth of your business with a software-defined storage solution.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017
Tech Talk: Busting the Malware Silver Bullet Myth
sponsored by McAfee, Inc.
VIDEO:
Hear how multiple layers of advanced malware detection and analysis technologies combat cyberthreat innovation.
Posted: 10 May 2017 | Premiered: 10 May 2017
Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO:
Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017