Operating systems

Whether its UNIX, Linux, OS, or Windows you favor, TechRepublic has everything you need to know to keep things running smoothly.

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 1

    Microsoft started the first of their new bug-bounty programs, focusing on finding vulnerabilities in IE11 on the upcoming Windows 8.1 OS. Rather than spending time fuzzing for RCEs, the presenter focused on pure logic bugs and the best place to find them was in the sandbox implementation.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exposing Bootkits with BIOS Emulation

    The security features added in modern 64-bit versions of Windows raise the bar for kernel mode rootkits. Loading unsigned drivers, which is what most rootkits will attempt to do, is denied by driver signature enforcement. PatchGuard protects the integrity of the running kernel, preventing them from modifying critical structures and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Desktop on the Linux... (and BSD, of Course)

    In this webcast, the presenter will discuss about the graphics subsystem (X11) is network transparent and provides IPC. So let's build the users own IPC system, that's not network transparent (DBus). The presenter also explains look at some of the pearls of strange API design.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1

    Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms - kernel land vulnerabilities are getting more and more valuable these days. For example, the easy way to escape from a sandbox is by using kernel vulnerability. That's why Microsoft struggles to enhance security of Windows...

    Provided By SecurityTube.net

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Keynote - Copper Droid on the Reconstruction of Android Malware

    In this webcast, the presenter presents the CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behavior of Android malware. Based on the key observation that all interesting behaviors are eventually expressed through system calls, CopperDroid presents a novel unified analysis able to capture both low-level OS-specific and high-level...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vaccinating Android

    Number of mobile applications is rising and Android still holds large market share. In this webcast, the presenter discusses about some runtime techniques and a tool will be released that offers two approaches to analyze Android applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    What's New in REMnux V4 for Malware Analysis?

    REMnux is a lightweight Linux distribution for assisting malware analysts with reverse-engineering malicious software. Release v4 of this popular distro came out in April 2013. It incorporates several new tools useful for analyzing malware in this Ubuntu-based environment.

    Provided By SecurityTube.net

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    Windows Upgrade: Key Processes And Resources Revealed

    Despite the end of Windows XP support, many organizations still heavily rely on Windows XP with legacy applications, though a timely change is a very good thing! View this webinar by Dell and discover how you can: Accelerate your migration to modern Windows Automate the migration...

    Provided By Dell & Microsoft

  • Webcasts // Jun 2013

    Analysis of a Windows Kernel Vulnerability

    In this webcast, the presenter explains the technical details of this exploit. It is not about \"Duqu\" nor Russian exploit kits. The vulnerability itself only allows the attacker to perform an \"OR\" operation on a value of their choice, at a memory location of their choice.

    Provided By SecurityTube.net

  • Webcasts // Sep 2012

    Let's Go Further: Build Concurrent Software Using the Go Programming Language

    In this webcast, the presenter will explain about building concurrent software using the Go programming language. Go is an open source programming environment that makes it easy to build simple, reliable, and efficient software. One of Go's key design goals is code adaptability; that it should be easy to take...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #8 - Astyanax Hector's Smart-Ass Son

    In this webcast, the presenter explains about publisher subscriber use cases with the problems faced while writing high transfer latency and must resent entire object on failure and on the reading side they faced heap pressure and hot spots. The presenter explains the solution by providing Astyanax Netflix open sourced...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #3 - How to Scale MongoDB

    In this webcast, the presenter will explains about MongoDB which is a scalable, high-performance, open source NoSQL database. The presenter explains about how to scale MongoDB along with Cassandra.

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #1 - From Data to Insights

    In this webcast, the presenters will explains BIRT the most capable open source data visualization and reporting technology. The presenter also explains about Cassandra another cool data source that can work and connect virtually to any data source.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Getting Direct Feedback From Your YouTube Community

    Do the user want to hear from (and see!) their site's community? In this webcast, the presenter will be sharing a new way to solicit videos from their users. Come and learn about how it was developed and see an example of it put to use as part of the...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    New Developments in Link Emulation and Packet Scheduling in FreeBSD, Linux, and Windows

    In this webcast, the presenters will give an overview of some recent activity done at the Universita di Pisa on link emulation and packet scheduling. They will cover two main topics: dummynet and fast packet scheduling algorithms.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Mastering Active Directory Migrations: Controlling Critical Issues

    Learn how the right combination of tools and processes can help to protect your core network operating system during the critical process of Active Directory migration.

    Provided By Dell Software

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Jan 2012

    How Citrix AppDNA Software Accelerates and Automates Application Migrations

    Automate application testing, application remediation and application preparation with the Citrix AppDNA application management platform. In this webcast, the presenter explains how AppDNA software works and why it is an essential asset for Windows 7 and Internet Explorer 8/9 deployments, application virtualization projects, desktop virtualization initiatives and Windows Server 2008...

    Provided By Citrix Systems

  • Webcasts // Jan 2012

    What Makes OpenVOS Open?

    In this webcast, the presenter discusses about the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the worlds most reliable operating system. VOS is now OPEN.

    Provided By Stratus Technologies

  • Webcasts // Jan 2012

    IT Consumerization - An Overview

    In this webcast, the presenter going to give an overview about IT Consumerization. Consumerization, the migration of consumer technology into the enterprise, is one of the most important and controversial issues facing CIOs today.

    Provided By Dell

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Nov 2011

    Multnomah County: Moving on From "Old & Clunky"

    In this webcast, the presenter discusses why he's excited to move from the county's "Old and clunky" intranet and onto an open-source platform, and how this change will help him do his job.

    Provided By UBM TechWeb

  • Webcasts // Nov 2011

    Tekzilla Daily Tip #562: Windows: Monitor Network Activity

    Do the users' miss XP and Vista's blinking network icon? In this webcast, the presenter will explain how to bring it back to Windows 7 with the help of the free tool called network activity indicator.

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Nov 2011

    Webcast: Ubuntu Cloud

    After years of development and fine tuning, the cloud vision of true computing elasticity is finally a reality. The question now is how organizations can best take advantage of the latest cloud technologies to optimize their IT, scale infrastructure and services in near-real time, and make the most of new...

    Provided By Canonical Ltd.

  • Webcasts // Jun 2013

    Analysis of a Windows Kernel Vulnerability

    In this webcast, the presenter explains the technical details of this exploit. It is not about \"Duqu\" nor Russian exploit kits. The vulnerability itself only allows the attacker to perform an \"OR\" operation on a value of their choice, at a memory location of their choice.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Desktop on the Linux... (and BSD, of Course)

    In this webcast, the presenter will discuss about the graphics subsystem (X11) is network transparent and provides IPC. So let's build the users own IPC system, that's not network transparent (DBus). The presenter also explains look at some of the pearls of strange API design.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Keynote - Copper Droid on the Reconstruction of Android Malware

    In this webcast, the presenter presents the CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behavior of Android malware. Based on the key observation that all interesting behaviors are eventually expressed through system calls, CopperDroid presents a novel unified analysis able to capture both low-level OS-specific and high-level...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exposing Bootkits with BIOS Emulation

    The security features added in modern 64-bit versions of Windows raise the bar for kernel mode rootkits. Loading unsigned drivers, which is what most rootkits will attempt to do, is denied by driver signature enforcement. PatchGuard protects the integrity of the running kernel, preventing them from modifying critical structures and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1

    Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms - kernel land vulnerabilities are getting more and more valuable these days. For example, the easy way to escape from a sandbox is by using kernel vulnerability. That's why Microsoft struggles to enhance security of Windows...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 1

    Microsoft started the first of their new bug-bounty programs, focusing on finding vulnerabilities in IE11 on the upcoming Windows 8.1 OS. Rather than spending time fuzzing for RCEs, the presenter focused on pure logic bugs and the best place to find them was in the sandbox implementation.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vaccinating Android

    Number of mobile applications is rising and Android still holds large market share. In this webcast, the presenter discusses about some runtime techniques and a tool will be released that offers two approaches to analyze Android applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    What's New in REMnux V4 for Malware Analysis?

    REMnux is a lightweight Linux distribution for assisting malware analysts with reverse-engineering malicious software. Release v4 of this popular distro came out in April 2013. It incorporates several new tools useful for analyzing malware in this Ubuntu-based environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2009

    MIX09: Using the Windows Azure Tools for Microsoft Visual Studio to Build Cloud Services

    In this webcast, the presenter explains the usage of the Windows Azure Tools for Microsoft Visual Studio to Build Cloud Services and also learns how to use the Windows Azure Tools for Visual Studio to more easily create, build, debug, deploy, run and package scalable services on Windows Azure.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2009

    MIX09: Overview of Windows Azure

    Curious about cloud computing? In this webcast, learn how to use Windows Azure to better address key challenges of running Internet-scale applications in the cloud. Also hear about the essential concepts of Windows Azure, including what's new.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2010

    Webcast: Smart Route to Windows 7

    Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process. During this 30 minute...

    Provided By Symantec

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Jan 2010

    The Smart Route to Windows 7

    As businesses review their upcoming migration to Windows 7, it is essential to review not only the migration tools but the entire IT infrastructure and areas in which efficiencies can be gained to make this a truly transformative event. Businesses should review their Windows 7 client security strategy to ensure...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jul 2010

    Three Ways to Reduce Power Consumption Costs,While Improving Your IT Security and Productivity

    Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational...

    Provided By Lumension

  • Webcasts // Aug 2009

    Live Webinar: Best Practices for Windows 7 Migration

    Migration to Windows 7 is a future reality for most. With XP approaching its end of life and many organizations simply choosing to skip Vista, the new Windows 7 release holds the promise of new features and benefits that include added security, improved manageability and enhanced ease of use. Still,...

    Provided By KACE

  • Webcasts // Aug 2009

    Webinar: Best Practices for Windows 7 Migration

    Migration to Windows 7 is a future reality for most. With XP approaching its end of life and many organizations simply choosing to skip Vista, the new Windows 7 release holds the promise of new features and benefits that include added security, improved manageability and enhanced ease of use. Still,...

    Provided By KACE

  • Webcasts // Aug 2009

    Web Event: Best Practices for Windows 7 Migration

    Migration to Windows 7 is a future reality for most. With XP approaching its end of life and many organizations simply choosing to skip Vista, the new Windows 7 release holds the promise of new features and benefits that include added security, improved manageability and enhanced ease of use. Still,...

    Provided By KACE

  • Webcasts // Aug 2009

    Best Practices for Windows 7 Migration

    Migration to Windows 7 is a future reality for most. With XP approaching its end of life and many organizations simply choosing to skip Vista, the new Windows 7 release holds the promise of new features and benefits that include added security, improved manageability and enhanced ease of use. Still,...

    Provided By KACE

  • Webcasts // Aug 2009

    Learn Best Practices for Windows 7 Migration

    Migration to Windows 7 is a future reality for most. With XP approaching its end of life and many organizations simply choosing to skip Vista, the new Windows 7 release holds the promise of new features and benefits that include added security, improved manageability and enhanced ease of use. Still,...

    Provided By KACE

  • Webcasts // Oct 2009

    Live Event: 7 Steps to Windows 7 Migration Success - A Tutorial

    With the Windows 7 release now a reality, the question for many organizations is no longer whether to migrate, but how. But what compatibility challenges accompany this new operating system? What tools are available to help? Industry expert Nelson Ruest and systems management appliance provider KACE provide the necessary steps...

    Provided By KACE

  • Webcasts // Oct 2009

    Live Web Event: 7 Steps to Windows 7 Migration Success - A Tutorial

    With the Windows 7 release now a reality, the question for many organizations is no longer whether to migrate, but how. But what compatibility challenges accompany this new operating system? What tools are available to help? Industry expert Nelson Ruest and systems management appliance provider KACE provide the necessary steps...

    Provided By KACE