Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Sponsored By Druva Software

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // May 2014

    Accelerated Results and Optimize Infrastructure with IBM Platform Computing

    This webcast short spotlights ways you can accelerate results and optimize your infrastructure and how IBM Platform Computing software and IBM Technical Computing solutions are helping to simplify the complexity of deploying and managing a high-performance IT infrastructure.

    Provided By IBM

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Provided By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Provided By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Provided By Brocade

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Darknet and Hidden Servers at Blackhat DC 2011

    Locally ran proxies that the users' can connect to and control via a web browser. These connect other I2P routers via tunnels. Network information is distributed via a DHT know as NetDB. In this webcast, the presenter will discuss the Darknets and hidden servers identifying the true IP/network identity of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Modsecurity Apache Module Primer

    In this webcast, the presenter explains about the basics of ModSecurity and how to use it effectively to secure web applications. ModSecurity is an Apache web server module that provides a web application firewall engine.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Reverse Engineering Secure HTTP API's with an SSL Proxy

    In this webcast, the presenter will explain a common (but insecure) method of securing HTTP APIs with SSL. As the presenter will demonstrate, properly configured SSL will protect a protocol from eavesdropping (man-in-the-middle attack) but will not protect that protocol from the end user himself.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

    Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystiphying and Fingerprinting the 802.15.4/Zigbee PHY

    In this webcast, the presenter explains about the methods of producing such IEEE 802.15.4 frames with commodity digital radio chips widely used in building inexpensive 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they fingerprint; however, their methods don't require a...

    Provided By SecurityTube.net