Events in the South

Network Security Evolved Zeus Kerravala

The changing cyber security threat landscape is driving a need for an essential shift in the trust model for security. Many IT pros are wondering: Should we be re-thinking how cyber security gets deployed, managed and addressed? Gain answers from one of the industry’s foremost security experts, Zeus Kerravala, Founder and Principal Analyst with ZK Research. This is your opportunity to address your security needs from within your network to provide your enterprise the capability of detecting and responding to the inevitable breach.


To join us for a complimentary dinner seminar, complete our brief registration form or contact Jeremy Caci at (617) 431-9701.


Dates and Locations

Chicago, IL

San Francisco, CA

Free Registration

2015 Backup 2.0 Road Tour: Breaking Old Rules to Meet New Data Protection Regulations George Crump

Historically, backup software was designed to do one thing -- restore data following a failure. Until now, this data has been largely untapped past data protection.  Recent developments in technology and changing business priorities are forcing IT shops to focus on methods that make this data readily accessible, and usable.  Part 1 of the event will focus on the backup and data protection applications being used on a day-to-day basis to backup and protect your company data. During Part 2, you’ll dig in the new technologies that are converging with backup to streamline processes, reduce redundant copies and increasing user productivity.

Register today by calling Jen Tobin at (617) 431-9722 or completing our quick online registration form.

Dates and Locations

Free Registration

2015 Enterprise Mobility Road Tour: Strategies for enabling and securing mobile apps, data and devices Jack Madden

Join Jack Madden – a trusted source of actionable and objective technical advice, and analyst and researcher at – for a half-day training seminar to develop the strategies and tactics you need to balance devices, security, apps and solutions, while ensuring east of deployment and management. Jack shares real-world case studies of enterprise mobility management in action, provides tips for securing mobile email, and advice on how to prevent wiping a device. In just one half-day out of the office, you discover what steps you can take now to set a mobile strategy in place (or strengthen the one you already have) to keep your users connected, secure and productive. 

Register today by calling Jen Tobin at (617) 431-9722 or completing our quick online registration form.

Dates and Locations

Dallas, TX

Free Registration

Learn how to solve your toughest challenges

Now more than ever, IT professionals can’t afford to waste time or money on anything that doesn’t produce results. For precisely this reason, TechTarget Events have been designed to provide complimentary, practical advice that you’ll put to use immediately.

TechTarget hosts a variety of IT focused seminars and large scale conferences globally that are designed to help you understand and solve the current technology-specific problems you face on a daily basis. You will benefit from industry analysts, top independent IT experts, peer to peer interaction and more. TechTarget’s face-to-face events are invaluable to technical and business decision makers because they deliver strategic, technical, vendor-neutral content that addresses the hard issues which help you solve current technology challenges. Apply to attend the conference that meets your specific IT needs today. For event related questions please contact Jenny Labelle, Director of Online Marketing at


What your peers say about TechTarget events

“Very informational regarding some of the best practices used in the industry today”

“Everyone involved in IT should see this. Cuts through marketing and myths.”

“Good opportunity for a little education, awareness, and networking”

“Provides overview and more in depth analysis and candid views to solutions”

Learn from the top independent technology analysts

Shawn Bass Picture Shawn Bass
Independent Consultant,
Brian Madden Picture Brian Madden
Independent Industry Analyst, Blogger & Author,
Jon Toigo Picture George Crump
President and Founder, Storage Switzerland
Howard Marks Picture Howard Marks
Founder and Chief Scientist,
Gabe Knuth Picture Gabe Knuth
Independent Industry Analyst & Blogger,
Jon Toigo Picture

Jon Toigo

CEO & Managing Principal, Toigo Partners International
Jack Madden Headshot Jack Madden
Jon Toigo Picture Michael Coté
Research Director, 451 Research
Robert Green
Principal, Enfinitum Consulting
Scott D. Lowe
Founder & Managing Consultant, The 1610 Group

Dedicated to the education of the IT community

John Halamka HeadshotJohn Halamka, MD
CIO, Beth Israel Deaconess Medical Center & CIO, Harvard

In addition to the roles above, Dr. Halamka serves as Chairman of the New England Health Electronic Data Interchange Network (NEHEN), CEO of MA-SHARE (the Regional Health Information Organization), Chair of the US Healthcare Information Technology Standards Panel (HITSP), and a practicing Emergency Physician.

Dr. Halamka authored three books on technology related issues and formed a software development firm, Ibis Research Labs, Inc. Additionally, he served as a columnist for Infoworld, technical editor of Computer Language Magazine and technology consultant to several startup companies.

Meet with the world's foremost technology vendors

Commvault Logo Accelera Solutions logo Oracle Logo Aerohive logo Quantum Logo
EMC Logo HP Logo IBM Logo AMD logo Avere logo
Avnet logo Axcient logo Browsium logo Ceedo logo CloudVelox logo
Comport Logo Data gravity logo Devolutions logo Dimension Data logo Druva logo
Eaton logo ExtraHop logo NEC Logo Nimble Storage Logo Pure Storage Logo
Tegile Logo Fiberlink logo FSLogix logo Coho Logo Fusion-io logo
Global Knowledge logo Infinio logo Nasuni Logo Insight logo Isilon logo
Nvidia logo OneCloud logo PernixData logo Pivot3 logo PowWow logo
Veeam Logo DataCore Logo Quroum logo Code 42 logo Derive logo
Samsung loho Simplivity logo SilverPeak logo Sphere 3D logo
StoneWare logo Strategic Hardware logo Storiant logo Toshiba logo TSRI logo
Maxta logo NaviSite logo Unitrends Logo Cisco Logo NetServe 365 logo
Violin Memory logo VMTurbo logo Workspot logo Zerto logo Dell logo
AppSense logo Arrow logo Blackberry logo CA Technologies logo Citrix logo
Exagrid logo Intel logo Moka5 logo Nutanix logo SAP logo
Tintri logo VCE logo VMware logo Atlantis computing logo IGEL logo
Lakeside Software logo     Tricerat logo

TechTarget global network of technology-specific websites