Events

Horse whisperer in action: What a project controller must be able to do

Horse whisperer in action: What a project controller must be able to do

Document management: ECM projects defy the economic situation

Document management: ECM projects defy the economic situation

Despite the crisis: no loss of IT service quality!

Despite the crisis: no loss of IT service quality!

Live Webcast: What's on the privacy agenda

Live Webcast: What's on the privacy agenda

Live webcast: Scaling AI projects down to the Exabyte range

Live webcast: Scaling AI projects down to the Exabyte range

Webcast: Digitization and AI in Financial Management

Webcast: Digitization and AI in Financial Management

Webcast: How to switch to S4 / HANA

Webcast: How to switch to S4 / HANA

App Permissions: Can my app do everything?

App Permissions: Can my app do everything?

Live Webcast: New Trends and New Ransomware Protection

Live Webcast: New Trends and New Ransomware Protection

Webcast: How mid-sized companies score with bots

Webcast: How mid-sized companies score with bots

Webcast: How CIOs score with zero trust

Webcast: How CIOs score with zero trust

Live Webcast: Using XDR against Cybercrime

Live Webcast: Using XDR against Cybercrime

Live webcast: Container in the company practice

Live webcast: Container in the company practice

Webcast: How Zero Trust works in practice

Webcast: How Zero Trust works in practice

Webcast: How CIOs derive data for business value

Webcast: How CIOs derive data for business value

Free to Download: Compare the leading EMM packages

Free to Download: Compare the leading EMM packages

Webcast: CIOs automate processes holistically

Webcast: CIOs automate processes holistically

App Ops Starter, Mobile Sandbox, Sophos AV, USSD Exploit Blocker: How To Make Your Android Device Safer

App Ops Starter, Mobile Sandbox, Sophos AV, USSD Exploit Blocker: How To Make Your Android Device Safer

Live Webcast: Why KI needs the right architecture

Live Webcast: Why KI needs the right architecture

Computer Week Webcast: How Amazon wants to ensure security in the cloud

Computer Week Webcast: How Amazon wants to ensure security in the cloud

Computerwoche webcast: Swiss Re wants to conclude with SAP S / HANA in five days

Computerwoche webcast: Swiss Re wants to conclude with SAP S / HANA in five days

Integration of WorkLife and Secusuite in Samsung KNOX: BlackBerry is partnering with Samsung

Integration of WorkLife and Secusuite in Samsung KNOX: BlackBerry is partnering with Samsung

Webcast on Analytics: What data analysis brings on the mainframe

Webcast on Analytics: What data analysis brings on the mainframe

On-demand Webcast: Privacy versus Technology? Legal in the public cloud

On-demand Webcast: Privacy versus Technology? Legal in the public cloud

Webcast: Cloud Networks - Network Management automatically included

Webcast: Cloud Networks - Network Management automatically included

A lot of work for the IT department: That's how Android comes into business

A lot of work for the IT department: That's how Android comes into business

Rare historical moments

Rare historical moments

Webcast: How IT bosses keep their devices secure

Webcast: How IT bosses keep their devices secure

Webcast: Why Continental works with low code

Webcast: Why Continental works with low code

Webcast: Get Cloud Native Applications Under Control

Webcast: Get Cloud Native Applications Under Control

Webinar: Better communication through the cloud

Webinar: Better communication through the cloud

Gartner Magic Quadrant Unified Endpoint Management: For many companies, UEM is still a dream of the future

Gartner Magic Quadrant Unified Endpoint Management: For many companies, UEM is still a dream of the future

Performance that pays off

Performance that pays off

Webcast: So expensive are imitations of toner cartridges

Webcast: So expensive are imitations of toner cartridges

iOS 13 supports true BYOD: Work Profile (Android Q) vs. User Enrollment (iOS 13)

iOS 13 supports true BYOD: Work Profile (Android Q) vs. User Enrollment (iOS 13)

Webcast: This is how the cloud protects physical security

Webcast: This is how the cloud protects physical security

Webinar: Security: This is how IT managers detect vulnerable employees

Webinar: Security: This is how IT managers detect vulnerable employees

Webinar: How IT bosses deliver the modern workplace

Webinar: How IT bosses deliver the modern workplace

Webinar: How KI ensures order in the input management

Webinar: How KI ensures order in the input management

Webcast: Protection from the Biggest IT Threats 2019

Webcast: Protection from the Biggest IT Threats 2019

Webcast: How IT Chiefs Take Control of Hybrid SAP Worlds

Webcast: How IT Chiefs Take Control of Hybrid SAP Worlds

Webinar: This is how the Software-Defined Datacenter works

Webinar: This is how the Software-Defined Datacenter works

Webcast: How CIOs Build Efficient Cloud Content Management

Webcast: How CIOs Build Efficient Cloud Content Management

Webinar: How to Find the Right Managed Security Partner

Webinar: How to Find the Right Managed Security Partner

Webinar: Why Digitization Requires Zero Trust?

Webinar: Why Digitization Requires Zero Trust?

Webcast: This is how KI recruits the best talents

Webcast: This is how KI recruits the best talents

Webcast: IT leaders with AI gain more value from the data

Webcast: IT leaders with AI gain more value from the data

Webinar: Better Customer Experience in the Contact Center

Webinar: Better Customer Experience in the Contact Center

Webcast: How IT Managers Build a Secure IoT Solution

Webcast: How IT Managers Build a Secure IoT Solution

Webcast: IT bosses get more out of the multi-cloud

Webcast: IT bosses get more out of the multi-cloud

Webcast: How the customer experience can be controlled multichannel

Webcast: How the customer experience can be controlled multichannel

Webcast: How IT bosses control the cooperation between man and machine

Webcast: How IT bosses control the cooperation between man and machine

Webcast: How IT bosses protect their data in the mobile cloud

Webcast: How IT bosses protect their data in the mobile cloud

Live Webcast: Intelligent Storage as a gateway to the autonomous data center

Live Webcast: Intelligent Storage as a gateway to the autonomous data center

Webinar: How IT Bosses Stop Malware From the Company's Mentors

Webinar: How IT Bosses Stop Malware From the Company's Mentors

Webcast: How Edge Computing Makes Data Fit

Webcast: How Edge Computing Makes Data Fit

Android Enterprise Recommended: Google recommends EMM providers

Android Enterprise Recommended: Google recommends EMM providers

Live webcast: That's how Thyssenkrupp uses the HoloLens glasses

Live webcast: That's how Thyssenkrupp uses the HoloLens glasses

Live Webcast: Make the Digital Shopper happy with KI

Live Webcast: Make the Digital Shopper happy with KI

Webcast: What a functioning security immune system looks like

Webcast: What a functioning security immune system looks like

Webcast: How CIOs Cope with AWS Cloud Beginner Errors

Webcast: How CIOs Cope with AWS Cloud Beginner Errors

Webinar: Effectively preventing shadow IT

Webinar: Effectively preventing shadow IT

Webinar: How IT bosses work with multiple clouds

Webinar: How IT bosses work with multiple clouds

Webcast: This is how the website becomes a sales force

Webcast: This is how the website becomes a sales force

Webcast: How an IT manager directs the multi-cloud

Webcast: How an IT manager directs the multi-cloud

Webinar: anchoring IT security in the minds of users

Webinar: anchoring IT security in the minds of users

Webinar: Chances and Limits of IAM from the Cloud

Webinar: Chances and Limits of IAM from the Cloud

Webcast: CIOs make machines think for themselves

Webcast: CIOs make machines think for themselves

Webcast: Public Cloud - but secure and user friendly

Webcast: Public Cloud - but secure and user friendly

Webcast: How KI finally allows collaboration

Webcast: How KI finally allows collaboration

Webcast: How to manage APIs customer centric

Webcast: How to manage APIs customer centric

Webcast: Lessons Learned in Cybercrime

Webcast: Lessons Learned in Cybercrime

Webinar: What belongs to a successful security training

Webinar: What belongs to a successful security training

Webinar: How IT bosses slow down cybercriminals

Webinar: How IT bosses slow down cybercriminals

Webinar: How IT Bosses Avoid Typical Cloud Usage Errors

Webinar: How IT Bosses Avoid Typical Cloud Usage Errors

Webinar: From the cloud to the archive - and legally secure

Webinar: From the cloud to the archive - and legally secure

Webcast: How CIOs with ERP from the cloud leverage the data

Webcast: How CIOs with ERP from the cloud leverage the data

Gartner Magic Quadrant Unified Endpoint Management: UEM shuffles the cards

Gartner Magic Quadrant Unified Endpoint Management: UEM shuffles the cards

Webcast: How IT bosses use geodata

Webcast: How IT bosses use geodata

Webinar: How IT Chefs Make Collaboration Safe

Webinar: How IT Chefs Make Collaboration Safe

Webcast: mainframe and innovation - why this is not a contradiction

Webcast: mainframe and innovation - why this is not a contradiction

Enterprise Mobility Management: EMM market is on the move

Enterprise Mobility Management: EMM market is on the move

Webcast: This is how mid-sized companies protect themselves against DDoS attacks

Webcast: This is how mid-sized companies protect themselves against DDoS attacks

Webinar: Using numbers instead of fear against cyber risks

Webinar: Using numbers instead of fear against cyber risks

Webinar: The benefits of backing up from the cloud

Webinar: The benefits of backing up from the cloud

Webinar: How to test digital products correctly

Webinar: How to test digital products correctly

Webinar: How CIOs Realize What Trends They Really Need

Webinar: How CIOs Realize What Trends They Really Need

Webcast: That's how KI adds value to Salesforce

Webcast: That's how KI adds value to Salesforce

Webcast: How IT bosses benefit from Kubernetes

Webcast: How IT bosses benefit from Kubernetes

Webinar: "Deep Security" as an answer to the risks of the GDPR

Webinar: "Deep Security" as an answer to the risks of the GDPR

Webinar: Dangerous Errors About the GDPR

Webinar: Dangerous Errors About the GDPR

Webinar: How data integration works

Webinar: How data integration works

Separate the professional from the private on the mobile device: protect professional contacts from WhatsApp & Co.

Separate the professional from the private on the mobile device: protect professional contacts from WhatsApp & Co.

Webcast: Why IT Leaders Need to Protect Their APIs From Hackers Now

Webcast: Why IT Leaders Need to Protect Their APIs From Hackers Now

Webcast: How IT bosses get the power of innovation from the cloud

Webcast: How IT bosses get the power of innovation from the cloud

Webcast: More productivity through IT Lifecycle Services

Webcast: More productivity through IT Lifecycle Services

Webcast: Prevent cybercrime without running costs out of hand

Webcast: Prevent cybercrime without running costs out of hand

(Not only) for businesses: iOS 11.3 - Apple brings many new features

(Not only) for businesses: iOS 11.3 - Apple brings many new features

Enterprise Mobility Management: Without EMM, compliance with the EU GDPR is difficult

Enterprise Mobility Management: Without EMM, compliance with the EU GDPR is difficult

Webinar: What belongs to a cloud strategy

Webinar: What belongs to a cloud strategy

Webinar: Model LinkedIn: How to use real-time data

Webinar: Model LinkedIn: How to use real-time data

Seven Golden Rules: How to Secure Mobile Devices in Business

Seven Golden Rules: How to Secure Mobile Devices in Business

Webcast Series: Risk Illegal Software

Webcast Series: Risk Illegal Software