Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Sponsored By Dell Software

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // May 2014

    Accelerated Results and Optimize Infrastructure with IBM Platform Computing

    This webcast short spotlights ways you can accelerate results and optimize your infrastructure and how IBM Platform Computing software and IBM Technical Computing solutions are helping to simplify the complexity of deploying and managing a high-performance IT infrastructure.

    Provided By IBM

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Provided By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Provided By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Provided By Brocade

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Darknet and Hidden Servers at Blackhat DC 2011

    Locally ran proxies that the users' can connect to and control via a web browser. These connect other I2P routers via tunnels. Network information is distributed via a DHT know as NetDB. In this webcast, the presenter will discuss the Darknets and hidden servers identifying the true IP/network identity of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Modsecurity Apache Module Primer

    In this webcast, the presenter explains about the basics of ModSecurity and how to use it effectively to secure web applications. ModSecurity is an Apache web server module that provides a web application firewall engine.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Reverse Engineering Secure HTTP API's with an SSL Proxy

    In this webcast, the presenter will explain a common (but insecure) method of securing HTTP APIs with SSL. As the presenter will demonstrate, properly configured SSL will protect a protocol from eavesdropping (man-in-the-middle attack) but will not protect that protocol from the end user himself.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

    Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystiphying and Fingerprinting the 802.15.4/Zigbee PHY

    In this webcast, the presenter explains about the methods of producing such IEEE 802.15.4 frames with commodity digital radio chips widely used in building inexpensive 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they fingerprint; however, their methods don't require a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Savage Curtain

    In this webcast, the presenter explore strange of new apps, seek out new mobile SSL bugs and new SSL implementation flaws, to boldly go where no man has gone before. The presenter will also explain trek across the mobile landscape showing numerous mobile failures, related to encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introducing Opabinia

    Checking for SSL issues form part of most infrastructure and web application assessments. However, these checks often are not detailed enough and can miss important issues. In this webcast, the presenter will introduce SSLAuditor4/Opabinia, a tool have automated SSL checks, making the task easier for the tester, while improving the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Tor: Attacks and Countermeasures

    Tor is an anonymisation network which allows users to browse the internet without their true IP address being identified. In this webcast, the presenter explains about how Tor works into the infrastructure and high-level protocol. The presenter also introduces Tor hidden services, untraceable websites, and how this service is provided...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    TCP Denial of Service Vulnerabilities

    The Transmission Control Protocol (TCP) is one of the fundamental protocols used in today's communication networks. Recently, there has been an increased discussion on possible Denial of Service (DoS) attacks against TCP-based services, which has largely been triggered by the partial disclosure of several vulnerabilities by the security company Outpost24....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Privacy in the Social Semantic Web

    However, many people have privacy concerns with such applications but the advantages and features often outweigh them. Instead of arguing against such services, the speaker proposes an alternative architecture based on the eXtensible Messaging and Presence Protocol (XMPP). Within a social network, members can link with each other in order...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Rich Internet Applications

    In this webcast, the presenter will examine the largely under researched topic of Rich Internet Applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Mining Social Contacts with Active RFID

    In this webcast, the presenter describes the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. The presenter also discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Provided By Centrify

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River