Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // Mar 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Learning From InfoSec Maturity: A Textual Analysis

    The Building Security In Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This webcast explores the firm characteristics and approaches to information risk of the participating BSIMM-V firms, primarily...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // Jan 2015

    The Automobile as Massive Data Gathering Source and the Consequences for Individual Privacy

    In this webcast, the presenter will report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users) positions are on this data gathering. In a summary,...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Oracle Data Redaction Is Broken

    The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be redacted or masked to prevent it being exposed to attackers. On paper this sounds like a great idea but in practice, Oracle's implementation is vulnerable to multiple attacks...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Stolen Data Markets an Economic and Organizational Assessment

    The substantial loss of customer data and resulting fraud have seemingly become more common, including the announcement of the target and Neiman Marcus compromises in 2013. As a result, the social and technical sciences are increasingly examining the market for data resale which is driven in part by these data...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Data Transforming Your Sewage Into Signatures

    What happens when the users collect a bunch of good data, under good pretences only to realize that the findings that they were expecting are completely wrong? Before they quit infosec and retreat to a farm, allow the presenter to tell them about how the presenter's data transformed data sewage...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Babar-Ians at the Gate: Data Protection at Massive Scale

    In this webcast, the presenter will explain how best to handle the looming big data risk in any environment. Better predictions and more intelligent decisions are expected from biggest data sets, yet do the users really trust systems they secure the least? And do they really know why "Learning" machines...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Adopting a Risk-Based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data

    Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, perimeter and infrastructure-based security programs no longer serve the dynamic security needs of organizations. A risk-based threat model can enable the user to regain control of their critical data regardless of where it resides, and empower their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data

    Measuring the effectiveness of any security activity is widely discussed - security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Provided By HP & Intel® Xeon® Processor

  • Webcasts // Jul 2014

    IBM Systems Magazine Webcast: What’s new for end-to-end workload automation to support new technologies

    Learn what’s new from IBM® that can help you automate workload scheduling across cloud, zEnterprise® and distributed environments.

    Provided By IBM

  • Webcasts // Jun 2014

    Simple Network Management Pwnd

    In this webcast, the presenter will deliver an in depth examination of SNMP, private MIB security issues and information extraction methodologies. Live demonstrations will walk the audience through methods for extracting data and performing comparative analysis to discover private MIBs involved in critical data leakage. Mitigation methods will be discussed...

    Provided By SecurityTube.net

  • Webcasts // Apr 2014

    Craig Young: Easy Ways to Bypass Anti Virus Systems

    Malicious software is all around the users. It permeates the Internet by riding on data transmissions. Once the users communicate, they risk getting in touch with malware (another name for malicious software). This is why every single one of the user, be it individual, company or organization, runs anti-virus software.

    Provided By SecurityTube.net

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

    Provided By CommVault Systems

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // Jan 2014

    Protecting Big Data At Scale

    In this webcast, the presenter will explains the measure and manage data with more precision than ever before using big data. But companies are getting Hadoopy often with little or no consideration of security. The presenter also explains how best to handle the looming big data risk in any environment.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Webcast: 3 Steps to Content Sharing and Collaboration ft. Forrester Research

    Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just ease-of-use. Strong security, mobile support, and deployment architecture are just a few of the many important factors to consider when evaluating vendors for a company-wide solution. Where...

    Provided By Box

  • Webcasts // Jan 2014

    Filtering Data

    In this webcast, the presenter will explain about the data-filtering tool in novell privileged user manager, which allows administrators to display only high-risk events that have occurred within a specified time period.

    Provided By Novell

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Dynamic Storage Technology

    In this webcast, the presenter going to explain about the dynamic storage technology can help the users' to reduce costs in their storage infrastructure through a method of managing the files.

    Provided By Novell

  • Webcasts // Jan 2014

    Data Management

    In this webcast, the presenter explains about the data management the file storage environment where the users' need to store the complete data. The presenter focuses on the latest capabilities and benefits of efficient data management.

    Provided By Novell

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 4 (Troubleshooting)

    In this webcast, the presenter introduces the support features in the Office Mail App. Along with the presenter will also explain how to troubleshoot any issues the users' may come across when deployin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 1 (Introduction)

    In this webcast, the presenter provides a brief introduction to the new look & feel of the enterprise vault office mail app, demonstrating what users can expect. Enterprise vault 10.0.3 introduces support for archive access from the outlook web app in exchange.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part:3 (Deployment)

    Enterprise Vault 10.0.3 introduces support for archive access from the outlook web app in exchange 2013. In this webcast, learn how to use the PowerShell console to deploy the new enterprise vault mail app to the end-users, and explains how the users' can mix.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Florida School District Protects and Manages Its Endpoints With Symantec

    Hillsborough County Public Schools centralized the management of its 85,000-plus endpoints with solutions from Symantec. The solution simplifies and consolidates licensing, improves risk posture, and maintains remote management of all endpoints.

    Provided By SYMA S.C.

  • Webcasts // Nov 2013

    Changing the Perception of IT – What Your Customers Wont Tell You

    To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being...

    Provided By ServiceNow