WebMediaBrands

Displaying 1-9 of 9 results

  • White Papers // Jun 2009

    What to Expect From Cloud Computing

    Cloud computing has become a huge buzz-phrase in the past year, but one would be forgiven for not knowing what the term really means. Different people interpret "Cloud computing" in different ways. That's a problem because computing "In the cloud" may be important for the organization, but if it's not...

    Provided By WebMediaBrands

  • White Papers // Jan 2009

    Getting The Most Out Of Performance Reviews

    As leaders, people likely have done their share of performance reviews. But, when was the last time they checked to see how effective they were? When executed correctly, appraisals should not only let employees know how they are doing and define strategies for improvement, but also motivate them to give...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Safe Email Practices

    Today's email environment lives in a threat environment that is higher than it has ever been. Some say that email itself is on the verge of extinction because of the perils associated with it. Others find it absolutely essential to conducting business in a networked world. This webcast presents a...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Enterprise Information Protection - Best Practices and Policies for Internet Security

    Trends show that the major obstacle to sound information security is not technical, but cultural. Yet most of the IT world continues to endorse a technology-centric approach to information protection. Many companies forget that security technologies are only as reliable and resilient as the underlying infrastructures they are trying to...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Decrypting Encryption - A Look at Data Encryption and Security Options

    Data security involves taking action and addressing multiple technology domains, including networks, servers, applications and storage. The importance of data security is not limited to large, high profile enterprise environments; rather, data security and awareness are needed across all environments.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Identifying Internal Security Threats

    Security threats are not limited to external attacks - threats from within can cause as much, if not more damage to a company's assets and reputation. Without a solid understanding of internal threats, an organization can be left unprepared to deal with the consequences of an attack from a trusted...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    How Hackers Exploit Application Weaknesses

    Attend this webcast to learn how hackers exploit application weaknesses.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Tracking the Hackers

    Knowing when the internal network has been compromised and determining the severity of the damage is vitally important to the organization. Hackers can take over a machine and use it for their own purposes.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Mail Security: Protecting Your Email From Spam and Viruses

    In the first 6 months of 2005, small businesses were the 2nd most targeted industry in terms of attacks. Spam and viruses coming through the email can result in data loss as well as lost employee productivity, potential legal liability, and an increased burden on resources and budget.

    Provided By WebMediaBrands

  • White Papers // Jan 2009

    Getting The Most Out Of Performance Reviews

    As leaders, people likely have done their share of performance reviews. But, when was the last time they checked to see how effective they were? When executed correctly, appraisals should not only let employees know how they are doing and define strategies for improvement, but also motivate them to give...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Safe Email Practices

    Today's email environment lives in a threat environment that is higher than it has ever been. Some say that email itself is on the verge of extinction because of the perils associated with it. Others find it absolutely essential to conducting business in a networked world. This webcast presents a...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Enterprise Information Protection - Best Practices and Policies for Internet Security

    Trends show that the major obstacle to sound information security is not technical, but cultural. Yet most of the IT world continues to endorse a technology-centric approach to information protection. Many companies forget that security technologies are only as reliable and resilient as the underlying infrastructures they are trying to...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Decrypting Encryption - A Look at Data Encryption and Security Options

    Data security involves taking action and addressing multiple technology domains, including networks, servers, applications and storage. The importance of data security is not limited to large, high profile enterprise environments; rather, data security and awareness are needed across all environments.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Identifying Internal Security Threats

    Security threats are not limited to external attacks - threats from within can cause as much, if not more damage to a company's assets and reputation. Without a solid understanding of internal threats, an organization can be left unprepared to deal with the consequences of an attack from a trusted...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    How Hackers Exploit Application Weaknesses

    Attend this webcast to learn how hackers exploit application weaknesses.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Tracking the Hackers

    Knowing when the internal network has been compromised and determining the severity of the damage is vitally important to the organization. Hackers can take over a machine and use it for their own purposes.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Mail Security: Protecting Your Email From Spam and Viruses

    In the first 6 months of 2005, small businesses were the 2nd most targeted industry in terms of attacks. Spam and viruses coming through the email can result in data loss as well as lost employee productivity, potential legal liability, and an increased burden on resources and budget.

    Provided By WebMediaBrands

  • White Papers // Jun 2009

    What to Expect From Cloud Computing

    Cloud computing has become a huge buzz-phrase in the past year, but one would be forgiven for not knowing what the term really means. Different people interpret "Cloud computing" in different ways. That's a problem because computing "In the cloud" may be important for the organization, but if it's not...

    Provided By WebMediaBrands