Back to Search Begin New Search Save Search Auto-Notify
Unveiling PhishTitan ICES - Protect you...
Modern threat actors use sophisticated attack methods to bypass traditional email security solutions. Email attacks have increased in sophistication and severity. As you know, it only takes one click on one dangerous link to lead to a significant compromise. In this webinar, we are thrilled to show you our new integrated cloud email security solution (ICES), PhishTitan. PhishTitan is a next-generation phishing protection and remediation soluti...
January 17, 2024
Organizer: Titan HQ | Microsoft 365
Location: Webcast
Add Favorite
Dashboard in a Day - Softcrylic
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. At Microsoft, we understand that in the current economic climate you are being asked to enhance your business by leveraging data to make critical business decisions in an efficient, precise and effective manner. Power BI is a business analytics service that gives you a single view of your business data, with the ability to monitor the health of yo...
January 17, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Dashboard In A Day - PragmaticWorks
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. At Microsoft, we understand that in the current economic climate you are being asked to enhance your business by leveraging data to make critical business decisions in an efficient, precise and effective manner. Power BI is a business analytics service that gives you a single view of your business data, with the ability to monitor the health of yo...
January 17, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Dashboard in a Day - UB Technology Inno...
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. At Microsoft, we understand that in the current economic climate you are being asked to enhance your business by leveraging data to make critical business decisions in an efficient, precise and effective manner. Power BI is a business analytics service that gives you a single view of your business data, with the ability to monitor the health of yo...
January 17, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
The Gartner 2024 Leadership Vision for...
Product management at technology providers serves as the hub around which business success spins. As new technologies like generative AI emerge, fresh decision-making approaches develop, and organizational barriers increase, product leaders must adapt to deliver value to their customers. The 2024 Gartner Leadership Vision for Product Management Leaders offers guidance on how product managers can prepare for three critical priorities in the com...
January 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Gartner 2023-2025 Technology Adoption R...
Technology leaders at midsize enterprises struggle to evaluate, select and deploy emerging technologies that add value. The Gartner Technology Adoption Roadmap harnesses the collective wisdom of midsize enterprise CIOs and leaders to understand adoption plans, value and risk perceptions of 50 technologies across six core domains: Computer infrastructure and platform services; storage and database; digital workplace; IT automation; network; and...
January 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Gartner Hype Cycle for Cloud Computing:...
Most organizations today use cloud computing, which continues to generate hype as well as technology innovations and trends. Infrastructure and operations leaders must treat the hype about cloud computing pragmatically, as innovations emerge and cloud use becomes ubiquitous. Despite the broad and mainstream use of cloud computing, hype surrounding the benefits and limitations of cloud persists. Most organizations use cloud computing and are in...
January 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Think Like a Spy to Improve Your Cybers...
State and local governments, K-12 districts, and higher education institutions face two kinds of threats: (1) Trusted Insider threats and (2) ‘Virtual’ Trusted Insider threats. Trusted Insider threats are rogue employees using authorized access to do unauthorized acts. This can include theft of data and services, fraud, or even system destruction or theft of IP and trade secrets. Virtual trusted insider threats happen when an emplo...
January 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Houston Red Hat User Group
Red Hat® Developer Hub is an enterprise-grade, open developer platform that helps organizations build and deploy applications faster, with better quality. Red Hat Developer Hub is based on Project Janus, a framework for building developer portals. Project Janus is a powerful and flexible framework that provides a solid foundation for building security focused, scalable, and easy-to-use developer portals. Join Red Hat and your local communi...
January 17, 2024
Organizer: Red Hat
Location: Houston, TX
Add Favorite
Red Hat Enterprise Linux Workshop A Foc...
Join Red Hat® for a hands-on technical workshop and learn how Red Hat Enterprise Linux® can help you deploy, manage, and innovate on a platform that will meet your needs today and scale for the future. In this workshop you will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Recording and System-wide Cryptography Policy. Both of these features were introduced in Red Hat Ent...
January 17, 2024
Organizer: Red Hat
Location: Virtual
Add Favorite
Back to Search Begin New Search