Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // May 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // May 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Learning From InfoSec Maturity: A Textual Analysis

    The Building Security In Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This webcast explores the firm characteristics and approaches to information risk of the participating BSIMM-V firms, primarily...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // May 2015

    The Automobile as Massive Data Gathering Source and the Consequences for Individual Privacy

    In this webcast, the presenter will report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users) positions are on this data gathering. In a summary,...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    NetApp Virtual Insight ASEAN

    Navigate into The New IT Landscape Join us for this LIVE event! Tuesday, 27 January at 10am Singapore Time Insight is about innovation. This virtual event is devoted to the technology-curious storage and data management professional, including system engineers, professional services consultants, channel partners, and...

    Provided By NetApp

  • Webcasts // May 2015

    Oracle Data Redaction Is Broken

    The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be redacted or masked to prevent it being exposed to attackers. On paper this sounds like a great idea but in practice, Oracle's implementation is vulnerable to multiple attacks...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Stolen Data Markets an Economic and Organizational Assessment

    The substantial loss of customer data and resulting fraud have seemingly become more common, including the announcement of the target and Neiman Marcus compromises in 2013. As a result, the social and technical sciences are increasingly examining the market for data resale which is driven in part by these data...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Data Transforming Your Sewage Into Signatures

    What happens when the users collect a bunch of good data, under good pretences only to realize that the findings that they were expecting are completely wrong? Before they quit infosec and retreat to a farm, allow the presenter to tell them about how the presenter's data transformed data sewage...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Stay Out of the Kitchen a DLP Security Bake-Off

    Despite a plethora of data security and protection standards and certifications, companies and their systems are still leaking information like a sieve. Data Loss Prevention (DLP) solutions have often been touted as the \"Silver bullet\" that will keep corporations from becoming the next headline.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Babar-Ians at the Gate: Data Protection at Massive Scale

    In this webcast, the presenter will explain how best to handle the looming big data risk in any environment. Better predictions and more intelligent decisions are expected from biggest data sets, yet do the users really trust systems they secure the least? And do they really know why "Learning" machines...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring

    In this webcast, the presenter will describe the different techniques available for data analysis and machine learning for information security, and discuss their strengths and caveats. The ghost of marketing past will also show how similar the unfulfilled promises of deterministic and exploratory analysis were, and how to avoid making...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Provided By ObserveIT

  • Webcasts // May 2015

    Adopting a Risk-Based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data

    Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, perimeter and infrastructure-based security programs no longer serve the dynamic security needs of organizations. A risk-based threat model can enable the user to regain control of their critical data regardless of where it resides, and empower their...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    On-demand Webcast: Centrify and Dropbox for secure collaboration

    Dropbox for Business lets organizations better access and control company data, with admin features that make it easy to deploy, provision, and manage effectively. Centrify offers an easy-to-deploy cloud service that delivers the industry's most comprehensive solution for Active Directory-based single sign-on, access control, and mobile device management for thousands...

    Provided By Centrify

  • Webcasts // May 2015

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // May 2015

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data

    Measuring the effectiveness of any security activity is widely discussed - security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce.

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Provided By EMC

  • Webcasts // May 2015

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Provided By HP & Intel® Xeon® Processor

  • Webcasts // May 2015

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // May 2015

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // May 2015

    Video: Cognizant delivers reliable, scalable knowledge management support

    This leading provider of IT consulting and business processes achieves an 80 percent reduction in client ticket volumes and a 40 percent improvement in mean-time-to-resolution rates with IBM SmartCloud Control Desk software.

    Provided By IBM

  • Webcasts // May 2015

    IBM Systems Magazine Webcast: What’s new for end-to-end workload automation to support new technologies

    Learn what’s new from IBM® that can help you automate workload scheduling across cloud, zEnterprise® and distributed environments.

    Provided By IBM

  • Webcasts // May 2015

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Provided By SAP

  • Webcasts // May 2015

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC

  • Webcasts // May 2015

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Provided By VMware

  • Webcasts // May 2015

    Simple Network Management Pwnd

    In this webcast, the presenter will deliver an in depth examination of SNMP, private MIB security issues and information extraction methodologies. Live demonstrations will walk the audience through methods for extracting data and performing comparative analysis to discover private MIBs involved in critical data leakage. Mitigation methods will be discussed...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // May 2015

    Make the Hybrid Cloud work for you

    Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics...

    Provided By IBM

  • Webcasts // May 2015

    Breakthrough "big data" storage solutions: IBM System x GPFS Storage Server

    This webcast short spotlights breakthrough “big data” storage solutions using IBM System x GPFS Storage Server -- a ground breaking, modular solution that can be optimized to balance client needs in terms of performance, capacity, cost and scale. This webcast short also shares capabilities in the broader IBM technical computing...

    Provided By IBM