Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • Podcasts // Jul 2015

    Network Forensics: What Are Your Investigations Missing

    Traditionally, computer forensic investigations focused exclusively on data from the seized media associated with a system of interest. Recently, memory analysis has become an integral part of forensic analysis, resulting in a new and significantly different way for digital examiners and investigators to perform their craft.

    Provided By SecurityTube.net

  • Podcasts // Oct 2014

    Migrating From Cisco ASA to Palo Alto Networks

    In this podcast, the speaker will show how easy it is to move to a next-generation security platform. The speaker also explains about the fundamental differences between Cisco ASA and Palo Alto Networks, and share migration best practices, examples and case studies.

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    VPN Pivoting With Cobalt Strike

    In this podcast, the speaker will discuss about VPN. It creates a network interface on the cobalt strike system and bridges this interface into the target's network. Through a covert VPN interface: the user system may sniff traffic on their target's network, act as a rogue server, or perform man-in-the-middle...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Blended Web and Database Attacks on Real-time, In-Memory Platforms

    It is well known there is a race going on in the \"Big data\" arena. One of the stronger competitors in the \"Big data\" market is real-time, in-memory platforms. An interesting thing about this platform and, the one the speakers will explain about specifically, is that it blends everything to...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    iOS App Integrity: Got Any?

    iOS apps are vulnerable to static analysis and attack through binary code patching. Incorporating jailbreak and debugger detection algorithms can be rendered useless with a quick binary patch. Once patched the app can be further exploited, its app data stolen, and even cloned.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Threat Modeling Made Interactive!

    Threat modeling is an important part of any secure development process. By identifying potential threats early in the development, the user can build effective mitigations into their system, rather than relying on costly patches and bug fixes. Existing techniques for modeling threats involve a whiteboard or some form of diagramming,...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Cloud Security at Scale and What It Means for Your Application

    Cloud computing is all the rage, but few organizations have really thought about what security means for their applications and networks in cloud-centric deployments. Netflix is amongst the largest users of public cloud resources and consumes roughly 1/3 of all the US's downstream broadband at peak. In this podcast, the...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Modernizing Network Security in SCADA and Industrial Control Systems

    In this podcast, the speaker will discuss the nature of both existing and emerging cyber threats to ICS and why asset owners need to pay attention to them, strategies and frameworks for defending the user's ICS against these threats and next-generation technologies that enable fine-grain visibility, role-based access control, and...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    How Evolved \"419 Scammers\" Are Targeting the Enterprise

    In this podcast, the speaker will focus on these key takeaways: Remote Administration Tools (RATs) such as NetWire, that provide complete control over infected systems, silver spaniel attacks are specifically designed to evade traditional antivirus programs and indicators of compromise were observed for the NetWire RAT, and unit 42 recommends...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Jul 2014

    Hiding in Plain Sight - What's Really Happening on Your Network

    Today's cyber threats hide in plain sight amidst the user's network traffic, making them nearly impossible to defend against. In this podcast, the speaker will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks. The speaker also gives information on how...

    Provided By Palo Alto Medical Foundation

  • Podcasts // May 2014

    Digging Deeper Into the IE Vulnerability

    Web browser vulnerabilities remain a fertile ground for hackers to harvest and mount attacks. Latest vulnerabilities found in Internet Explorer (IE) and urgent response from Microsoft highlights the fact that despite end of life announcements for old and less secure products, millions of users remain exposed to threats.

    Provided By SecurityTube.net

  • Podcasts // Apr 2014

    Basics of Hardware Snapshots

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn...

    Provided By CommVault Systems

  • Podcasts // Apr 2014

    IBM MobileFirst - Infrastructure Consulting Services

    Mobile technology can be overwhelming, that’s why leaders have told us that they look to external IT service providers to help them reach their mobility goals. Watch the video to learn how IBM MobileFirst Infrastructure Consulting services can help you identify important aspects of mobility you may be overlooking; address...

    Provided By IBM

  • Podcasts // Feb 2014

    AIG Podcast

    Learn how AIG's Global Performance Architecture Group improved the performance of their services to deliver better experiences and payoffs for businesses and end-users alike. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Feb 2014

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    BYOEF Video

    Learn how build your own a highly resilient, high-performance Brocade Ethernet fabric.

    Provided By Brocade

  • Podcasts // Jan 2014

    AirSnare - Intrusion Detection Software for Windows

    In this podcast, the speaker explains about the AirSnare. It helps the user will learn about how to use AirSnare tool for Intrusion Detection System (IDS) setup. AirSnare is a very powerful and very useful for network IDS.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Proxy Server

    Proxy server works as intermediate server to send the requests to main servers on internet on behalf of other computers, so that can hide the identity of actual requester or user using internet. It is like a middleone that works between the user's computer and the server.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    TDL4 Rootkit - Being Used as a Proxy

    In this podcast, the speaker will explain the TDL4 Rootkit. It helps the user to learn how the new TDL4 Rootkit uses an infected PC as a proxy server. The TDL4 Rootkit claimed to support all versions of Microsoft Windows, since XP including Windows 7 sp1, inclusive, and supports both...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Using Security Tools - Paros Proxy

    Paros is a program for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cookies and form fields, can be intercepted and modified.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Load Balancing Apache Server

    In this podcast, the listener can learn how to setup Load Balancing on Apache server. The speaker will explain how this load balancing works on two apache server and why load balancing is important for security.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    SSH Gymnastics Using Proxychains

    Proxychains is a Linux dynamically loadable library that will intercept any TCP and UDP traffic from a specific process and tunnel it over HTTP, SOCKS4 or SOCKS5 proxy. In this podcast, the speaker will explain how to Use Proxychains to pivot through SSH servers to reach internal systems.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    NetBackup 7.5 for VMware

    In this podcast, the speaker will explain about NetBackup 7.5 for VMware. Get a deep dive look into how the NetBackup Platform provides a superior solution for protecting virtual servers which includes a technology overview.

    Provided By SYMA S.C.

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // Dec 2013

    Excluding an IP Address from Video Caching on a Citrix CloudBridge Appliance

    The CloudBridge appliance proxies every HTTP connection as a result the user may want certain source or destination IP address from the proxy behavior. This may be needed to access application that are configured for 1:1 access.

    Provided By DABCC

  • Podcasts // Dec 2013

    Configuring Domain Append on a CloudBridge Appliance

    Internal servers in an enterprise are part of a domain and are resolved using the domain. The CloudBridge appliance proxy's users on the network, but does not resolve the domain suffix.

    Provided By DABCC

  • Podcasts // Nov 2013

    Why care about managed services? Transformational benefits, that's why

    This mini paper and podcast features Lynn Koch discussing the benefits of managed services.

    Provided By IBM

  • Podcasts // Nov 2013

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Different workloads, different architectures, one solution

    A live white-boarding session where the Citrix cloud team talks about the different types of application workloads that run in the cloud, how they are architected and how Citrix CloudPlatform can deliver any type of workload. Watch now!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By WindRiver

  • Podcasts // Sep 2013

    Drive Your Transformation

    Drive your transformation to cloud computing.

    Provided By Technologent

  • Podcasts // Sep 2013

    EMC VSPEX

    EMC VSPEX - World's fastest-growing reference architecture. EMC VSPEX, now delivers 2X more virtual machines at the same price, and an even broader spectrum of choice for workloads that matter.

    Provided By Technologent

  • Podcasts // Aug 2013

    Trends in Video Collaboration and Unified Communications

    Unified communication solutions can help organizations improve their productivity, stay competitive and be more agile. But knowing what type of communication solutions your organization solutions your organization needs can be difficult and time-consuming. In this on-demand webinar, AVI-SPL's vice president of Collaboration Solutions, Shai Moshe, shares insights and advice...

    Provided By AVI-SPL

  • Podcasts // Aug 2013

    Cloud Networking: What It Means for App Development

    In this podcast, the speaker will look at the application delivery controller's effect on the development, deployment and maintenance of applications, and web applications in particular. Starting with an overview of the evolution of load balancers into Application Delivery Controllers (ADCs), the speaker will then dive deeper into how the...

    Provided By O'Reilly

  • Podcasts // Jul 2013

    How To Avoid IP Address Conflicts

    An IP address conflict occurs when two computers on the same network have been assigned the same IP address. This conflict causes malfunction of communication from/to "shared" IP Address and can spiral into a frantic troubleshooting event. In this video we will discuss how to identify, resolve and prevent static...

    Provided By SolarWinds

  • Podcasts // Jul 2013

    Cape Cod Academy meets the BYOD challenge with HP Networking solutions

    How did the Cape Cod Academy triple wireless bandwidth, expand coverage by 20% and personalize the education experience among its students, faculty and staff? This case study outlines how they met their BYOD challenge during the mobile device boom with HP Networking Solutions.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: Underwriters Laboratories future-proofs their network

    See how HP helped Underwriters Laboratories future-proof their network with solutions to fulfill their goals with a reliable, centrally managed network built on modular, scalable HP technologies that support their projected growth over the next ten years.

    Provided By Hewlett-Packard (HP)