Webinar | Applications | BI
Denodo

Is your organization's transition to the cloud slow and filled with downtime? Are your data scientists spending more time gathering data than analyzing it?

Accelerate the success of your data...

Read MorePublished: 03/04/2020
Webinar | Security | Identity Management
Thycotic

Least privilege is intended to prevent “over-privileged access” by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk....

Read MorePublished: 03/04/2020
Whitepaper | Backup / DR | Cloud
Zerto

How much is your backup costing you? Explore the seven deadly sins of backup today and find out just what a modern, resilient IT platform can do to redeem your systems.

Read MorePublished: 03/04/2020
Whitepaper | Backup / DR | Cloud
Zerto

Ransomware threats increased by 300% last year, and the industry is expecting it to get worse.

Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions...

Read MorePublished: 03/04/2020
Whitepaper | Security | Unified Threat Management
ThreatQuotient

This survey was conducted to help women entering and advancing in the cybersecurity industry.

Read MorePublished: 03/04/2020
Press Release | End-user Computing | Desktops and workstations
Hewlett Packard Enterprise

Hewlett Packard Enterprise (HPE) today announced a series of initiatives to help customers and support business continuity in the wake of COVID-19. Recognizing the growing need to deploy or scale...

Read MorePublished: 03/04/2020
Webinar | Cloud | CaaS - Computing
Alibaba Cloud

Digital Alibaba Cloud Day APAC

23 Apr 2020 - 10:00AM SGT

Alibaba Cloud Day is back in APAC and is now bigger than ever. In order to ensure the safety and health of our customers and partners during the COVID-19 outbreak, we will be bringing the Alibaba...

Read MorePublished: 03/04/2020
Whitepaper | Operating System Platforms | Performance monitoring
LogicMonitor

Today's executives rely upon IT departments to deliver a seamless digital customer experience.

However, the real challenge comes when the very IT initiatives that are supposed to be helping...

Read MorePublished: 03/04/2020
Promotion | Applications | BPM - Business Process Management
Axway

Syncplicity wants to keep your workforce productive and your business secure with FREE licenses*.

Syncplicity is a secure solution for remote workers to share files internally, externally and...

Read MorePublished: 02/04/2020
Whitepaper | Security | Firewall IDS IPS
McAfee

With the increasing number of natural disasters, terrorism events, and unrest around the globe, the importance of business continuity planning and disaster recovery planning is becoming more apparent....

Read MorePublished: 02/04/2020
Whitepaper | Security | Firewall IDS IPS
McAfee

The intent of this paper is to present a compilation of the easiest and most prevalent network-based techniques an attacker can use to gain access to systems and data, also popularly known as...

Read MorePublished: 02/04/2020
New Product | End-user Computing | Desktops and workstations
Microsoft

The Surface for Business portfolio of devices delivers experiences employees love with the choice and flexibility they need to work on their terms.

Read MorePublished: 02/04/2020
Webinar | Applications | Project Management
MEGA International

The COVID-19 pandemic underscores the importance for organizations to ensure business continuity when such large-scale crises can span months and expand all over the world.

Join us for this...

Read MorePublished: 02/04/2020
Whitepaper | Applications | Project Management
MEGA International

Application Portfolio Management is the process by which IT managers can have a clear view of their existing applications and technologies – and effectively rationalize their IT landscape, cut costs...

Read MorePublished: 02/04/2020
Webinar | Security | Identity Management
Auth0

As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. These attacks can lead to fraud, loss of reputation,...

Read MorePublished: 02/04/2020
Webinar | Security | Identity Management
Auth0

Make Remote Work - Session 2

23 Apr 2020 - 9:00AM AEDT

Remote work is becoming more common now than ever before. While this can be scary for companies, managers and remote workers alike, it doesn’t have to be.

Join Auth0’s Co-Founder and CTO,...

Read MorePublished: 02/04/2020
Webinar | Applications | IT Service Managements
Atlassian

Learn how to manage a busy, business-critical Atlassian implementation of Data Center versions of Jira, Confluence, and Bitbucket.

Read MorePublished: 02/04/2020
Webinar | Storage | SAN
Hitachi Vantara

NVMe storage is more than just a performance boost, it will drive a fundamental system and application changes and enable new use cases. Hear how Hitachi Vantara is expanding NVMe options within the...

Read MorePublished: 02/04/2020
Webinar | Cloud | Storage
Hitachi Vantara

In the past few months, there has been a flurry of IT trend predictions. Just about everything has been covered ad nauseam. I have contributed my thoughts about these trends to publications for over...

Read MorePublished: 02/04/2020
Webinar | Applications | BI
Microsoft

Please join the Microsoft team for updates from across the business, news and information and to help you better connect with Microsoft Australia and the partner community.

This month we will...

Read MorePublished: 02/04/2020
Show More..
Top
ITUpdate loading
Loading...