Conference Event Management SolutionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Conference Event Management Solutions returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Web, Video and Audio Conferencing
 •   Collaborative Tools
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Security Policies
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security

Related Searches
 •   Audit Conference
 •   Conference Event Consulting
 •   Conference Event Management Best
 •   Conference Event Management Mac
 •   Conference Event Management Risks
 •   Graphs Conference Event Management
 •   History Conference
 •   Importing Conference Event
 •   Rfp Conference Event
 •   Trends Conference Event
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Security Information and Event Management: Unique McAfee data management technology by McAfee, Inc.

March 23, 2012 - (Free Research)
This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements. 
(WHITE PAPER) READ ABSTRACT |

Realize positive ROI on your SOA investments by Vitria Technology, Inc.

May 2008 - (Free Research)
This white paper discusses the steps to achieve greater operational visibility to better meet customer requirements and enhance business responsiveness. 
(WHITE PAPER) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Log Management and SIEM: Build a Solid Foundation for Compliance by McAfee, Inc.

November 2012 - (Free Research)
This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more. 
(EGUIDE) READ ABSTRACT |

Symantec Vision 2012: 4 Highlights by Symantec Corporation

June 2012 - (Free Research)
This year’s annual Symantec Vision conference in Las Vegas offered focus groups, interactive labs, opportunities for certification and one-on-one sessions with Symantec software experts. Check out this brief E-Guide to learn the specific highlights and announcements made at this event. 
(EGUIDE) READ ABSTRACT |

PCI Compliance Made Simple by Alert Logic

February 2008 - (Free Research)
Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

IBM Cognos Online Conference for Retailers and Manufactures by IBM

October 2009 - (Free Research)
This 2-hour complimentary virtual seminar on performance management (PM) takes place on October 21 and continues on November 4th — Join us to learn how PM can help you improve visibility into your manufacturing business so you can reduce costs, speed delivery and efficiency, satisfy customers and create innovative new products. 
(VIRTUAL SEMINAR)

Monash University Video Testimonial by Concur Technologies (E-mail this company)

June 2014 - (Free Research)
Check out the following webcast to see just how Monash University was able to gain substantial benefits by revamping their records management solution. 
(VIDEO) READ ABSTRACT |

A Manager’s Guide to Perfecting Performance Management: How to Transform Your Employee Review Process by Ultimate Software

April 2013 - (Free Research)
Experts agree that traditional, once-a-year employee reviews are holding back business performance. This resource counts down six simple steps that will help you perfect employee performance management at your organization. 
(WHITE PAPER) READ ABSTRACT |

Compliance, complexity and the need for XBRL: An interview with former SEC Chairman Christopher Cox by IBM

June 2011 - (Free Research)
In this interview with Christopher Cox, a former SEC Chairman, he discusses the key drivers in the US that will be shaping regulatory and compliance reform, how Finance organizations should prepare for this future regulatory environment, and best practices for boards of directors with regard to risk oversight and risk governance. 
(WHITE PAPER) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

IBM Information On Demand Virtual 2010 by IBM

December 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

SharePoint Conference 2009: Steve Ballmer Keynote Address by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
This video covers highlights from the Microsoft SharePoint Conference in 2009, including Microsoft CEO Steve Ballmer's keynote address. 
(VIDEO) READ ABSTRACT |

SCOPIA Conferencing Platform for IBM® Lotus® Sametime® by RADVISION

June 2008 - (Free Research)
The SCOPIA Conferencing Platform with SCOPIA Desktop enables users to create and initiate multiparty audio and video conferences directly from within Lotus Sametime. 
(WHITE PAPER) READ ABSTRACT |

SCOPIA Connector for Microsoft Office Communications Server 2007 by RADVISION

June 2008 - (Free Research)
RADVISION is extending its support of the Microsoft unified communications product line with the new SCOPIA Microsoft Office Communications Server (OCS) 2007 Connector. 
(WHITE PAPER) READ ABSTRACT |

The Best of RSA: Mobile Security by SearchSecurity.com

May 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

Desktop Video Conference Preparation: 4 Key Steps by SearchSecurity.com

November 2013 - (Free Research)
This expert E-Guide discusses what to expect and how to tackle the potential challenges of mobile and desktop video conferences in the workplace. 
(EGUIDE) READ ABSTRACT |

How to Give a Killer Presentation: Lessons from TED by Citrix Online Go To Meeting

June 2013 - (Free Research)
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting. 
(WHITE PAPER) READ ABSTRACT |

Scheduling, Facility, Hoteling Software: Sharing Desks, Offices, Conference Rooms, and Even Parking Spaces by DeskFlex

August 2008 - (Free Research)
Desk sharing among mobile workers is known by several names, hoteling, hot-desking, virtual office, etc. Read this paper to learn how to increase office productivity with scheduling, facility, and hoteling software. 
(WHITE PAPER) READ ABSTRACT |

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge by IBM

December 2012 - (Free Research)
This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

The 7 Biggest Mistakes You Can Make in Web Conferences by Citrix Online Go To Meeting

December 2013 - (Free Research)
In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts