Webcasts

  • LIVE WEBCAST: September 30, 2014 at 11:30 AM

    How Moving Your Contact Center to the Cloud Eliminates Risk

    Topic:
    Cloud Computing, IT Management

    The total cost of ownership (TCO) debate between a premises and cloud decision continues to wage on. Depending on how you look at it, it seems that you arrive at a different conclusion.

    Register Now
  • ON DEMAND

    Achieve continuous data protection with Dell AppAssure

    Topic:
    Data Center, Data Protection

    Since moving to Dell AppAssure, the University of West Alabama has achieved a 100% success rate for recovering lost data. The university is also able to back up more data on less space, reducing disk space costs by 50%.

    View Now
  • ON DEMAND

    Get end-to-end data protection with Dell AppAssure

    Topic:
    Data Protection, Disaster Recovery, IT Management, Security

    Dell AppAssure provides end-to-end protection to ensure both data security and access. With inline deduplication and incremental backups, AppAssure targets new and changed data to reduce backup times and disk space needs.

    View Now
  • ON DEMAND

    Simplify data protection with Dell

    Topic:
    Data Center, Data Protection

    Spend just two hours per week or less monitoring and managing your backups. NetVault Backup 10 enables you to back up petabytes worth of data across large and diverse environments from a single, intuitive console.

    View Now
  • ON DEMAND

    Vblock™ Specialized System for SAP HANA®

    Topic:
    Data Center, Hardware, Networking, Storage

    Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes.

    View Now
  • ON DEMAND

    The Need for a New Approach to Provisioning

    Topic:
    Business, Business Intelligence, Security

    Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning.

    View Now
  • ON DEMAND

    The Current State of Identity and Access Management

    Topic:
    Business Intelligence, IT Management, Security

    Organizations have realized that the traditional approach to IAM doesn't work. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.

    View Now
  • ON DEMAND

    Preventing Data Breaches with Data Access Governance

    Topic:
    Business, Data Protection, Security

    Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.

    View Now
  • LIVE WEBCAST: September 30, 2014 at 2:00 PM

    Building a Hybrid Cloud

    Topic:
    BPM, Cloud Computing

    Cloud is a hot topic in IT, but so are the security and privacy issues surrounding it. How can IT take advantage of cloud, continue to run critical applications without significant transformation, and maintain visibility and control over data?

    Register Now
  • LIVE WEBCAST: September 30, 2014 at 2:00 PM

    Log Analytics for Network Operations Management

    Topic:
    IT Management, Networking

    While log analytics is a well-known approach within systems and security management, its use in support of network operations is relatively new. Join EMA VP of Research, Jim Frey, for this informative webinar to get the latest research results.

    Register Now
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness