Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // Mar 2015

    Turning the Tables on Cyber-Attacks

    Welcome to the future of Endpoint Protection. If you work on the front lines of IT security, you know that you have seconds to prevent an advanced cyber-attack. Watch this short on-demand webcast and learn how a new technology is really turning the tables on cyber-attacks.

    Provided By Intel Security

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Provided By Symantec

  • Videos // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

    Provided By Intel Security

  • Videos // Dec 2014

    IronKey Enterprise S250 and D250 Solutions Video

    IronKey delivers secure portable data storage solutions, including hardware-encrypted USB flash drives and external hard drives, for your mission-critical mobile workforce and the invaluable data they carry.

    Provided By IronKey

  • Videos // Dec 2014

    IronKey Enterprise Management Console Video

    Centrally administer access and usage policies across thousands of IronKey Enterprise flash drives and Workspace drives with the cloud-based or on-premise IronKey™ Enterprise Management Service or Server. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are...

    Provided By IronKey

  • Videos // Nov 2014

    Five Must Haves for Enterprise Mobility Management

    Forty-four percent of employees want a phone for work and personal use respectively, but mobile malware has increased by four times last year. How do you embrace employees’ productivity while keeping corporate data safe? Get started with the Enterprise Mobility Management Solution (EMM). Watch our on-demand webcast, the “5 Must-Haves...

    Provided By Symantec

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Provided By Symantec

  • Videos // Oct 2014

    Video : Radboud University enhances security for over 40,000 users with Dell One Identity Manager

    Watch this video to learn how Radboud University improved business agility and enhanced security while controlling costs with Dell One Identity Manager.

    Provided By Intragen

  • Videos // Oct 2014

    Enterprise File Synch & Share Webcast

    Watch this webinar from IBM and Aberdeen Group to see highlights of the latest research on file synch / file share solutions to support personal productivity and collaboration.

    Provided By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Provided By IBM

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Provided By IBM

  • Videos // Sep 2014

    Free Online Seminar - Securing Your Hybrid Data Centres

    Are you concerned about the security challenges in your hybrid data centre? Join us in a must-watch online seminar and learn how to tackle the security challenges of your hybrid data centre. Limited spots available. Register for free today.

    Provided By Intel Security

  • Videos // Sep 2014

    Maccabi Healthcare Services keeps Mobile Apps healthy

    How to keep your Mobile Apps healthy? Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there....

    Provided By HP

  • Videos // Sep 2014

    Webcast On-Demand: Maccabi Healthcare Services keeps Mobile Apps healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Watch the webinar to see how Maccabi...

    Provided By HP

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // Jun 2014

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Provided By Dell Software

  • Videos // Jun 2014

    Unlock the Four Layers of Security with Enterprise Mobility Management

    Watch this informative video to learn how to fortify your organization with four layers of security (data loss prevention, data encryption, secure remote access and a firewall) using Dell Enterprise Mobility Management solutions.

    Provided By Dell Software

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Provided By Workday

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Provided By Dell Software

  • Videos // Apr 2014

    Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure Video

    The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So...

    Provided By VMware

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Provided By IBM

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Provided By IBM

  • Videos // Mar 2014

    The Power of One Video featuring HP VP Paul Durzan

    Introducing HP BladeSystem with HP OneView. One system and management platform. More efficient, faster, more reliable. Sponsored by HP and Intel® Xeon® Processor: Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in...

    Provided By HP & Intel® Xeon® Processor

  • Videos // Feb 2014

    Video Case Study: Sentara Healthcare

    Sentara Healthcare, a regional healthcare services provider based in Virginia, shares their success in using HP Performance Anywhere Software. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Provided By Hewlett-Packard (HP)

  • Videos // Feb 2014

    Video: IT Trust Curve Global Study: Irina Simmons

    Watch Irina Simmons, Chief Risk Officer at EMC, discuss the impact Trust can have on the success of top IT initiatives today.

    Provided By EMC

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Provided By Acronis

  • Videos // Jan 2014

    Box Case Study: Enterasys

    At Enterasys, a leading provider of wired and wireless network solutions, employees needed to share critical content on the go, from any device. Today, with Box, over 1100 employees -- from Sales to Engineering -- collaborate and share important information from wherever they are.

    Provided By Box

  • Videos // Nov 2013

    Video: Smarter Analytics - Reducing the cost of risk at University of California

    The University of California, the largest higher education institution in the world, applied Smarter Analytics to significantly improve the enterprise risk information system for smarter decision-making. With ERMIS, UCOP was able to reduce the cost of risk from around $18 per thousand of operating budget to around $13.43, translating to...

    Provided By IBM

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Provided By Symantec

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Provided By Workday

  • Videos // Jul 2011

    Novus SERP Flash Demo

    Novus Storage Enterprise Resource Planner (SERP) brings business intelligence to the storage environment. It tells you what business units are using which storage assets, when they use it, where it's being used, and how well it's being used. Watch this demo to see how SERP can help you gain insight...

    Provided By IBM

  • Videos // Jul 2011

    Automate processes with IBM Virtualization

    In the journey through virtualization, the automation of processes like provisioning and service management is essential to moving organizations to greater business effectiveness. This video describes how IBM® Virtualization solutions enable organizations to codify their best practices, processes and service level agreements to automate tasks and processes and improve business...

    Provided By IBM

  • Videos // Jul 2011

    IBM Virtualization Management Solutions

    Virtualization has the potential to make organizations more agile and responsive, empowering them to meet business goals by delivering levels of service quality and types of services that will add to their bottom line. This video describes how IBM Virtualization Management Solutions can help you manage physical and virtual resources...

    Provided By IBM

  • Videos // Jul 2011

    GFI MailEssentials Complete Appliance Demonstration

    View a 20-minute product demo of this comprehensive email protection solution that combines antivirus, anti-spam and attachment filtering in a robust, highly scalable, easy-to-manage platform.

    Provided By GFI Software

  • Videos // Jul 2011

    Watch this 5-minute video to learn more about the benefits of VIPRE Antivirus Business

    Until now antivirus has been slow and hard to manage - but there is a fast and easy solution, VIPRE Antivirus Business! VIPRE Business offers - Fast endpoint protection - Easy deployment and manageability - Reliable detection and remediation all at an affordable price!

    Provided By GFI Software

  • Videos // Jul 2011

    Information Management Why Renew Video

    Transform your businesses to be smarter, greener and more cost effective by renewing your Software Subscription and Support. Watch our video and learn about the benefits of renewing on-time direct from Debbie Landers, Vice President, Worldwide Client Support, Information Management Software.

    Provided By IBM

  • Videos // Oct 2010

    Microsoft Online Services from an Administrator's Point-Of-View

    This video presents an overview of Microsoft Online Services to see how you can accelerate deployment, simplify management and ensure you are always on the latest technology.

    Provided By Microsoft

  • Videos // May 2011

    Business Video: Optimize to Preserve and Increase Business Value

    As a user of business video, you understand that a consistently high-quality video experience requires ongoing monitoring and tuning of the underlying network and solutions. Identifying operational efficiencies and new capabilities for communication, collaboration, education, and security is crucial. Cisco Services has produced a series of four white papers to...

    Provided By Cisco Systems

  • Videos // Oct 2011

    Open Data Center Alliance: Usage Model Requirements

    This video highlights the Open Data Center Alliance's initial publication delivery of eight usage model requirements for cloud as well as tracks the Alliance's growth since its inception in October 2010.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Intel Trusted Compute Pools Video

    Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud.

    Provided By Intel Corporation

  • Videos // Oct 2011

    TechRepublic Live 2011: Cybercrime updated

    A video recording of a presentation by Debra Littlejohn Shinder given at TechRepublic Live 2011 in Louisville, KY, on September 28th, 2011.

    Provided By TechRepublic.com

  • Videos // Nov 2011

    Smarter Data Center Multi-media white paper

    The Value of Smarter Data Center Services mutli-media white paper discusses why partnering with external data center providers such as IBM is a smart choice for many IT organizations. According to IDC, these type of relationships can help organizations glean the most value possible from their virtualized data center investments...

    Provided By IBM

  • Videos // Oct 2010

    See the possibilities of a future with an Application Fluent Network

    See how an Alcatel-Lucent Application Fluent Network can help you build a high performing, low complexity converged network. No matter what industry you're in, get the performance you need to meet your growing network demands: Enable real-time application delivery Adapt dynamically to the requirements of new users and applications...

    Provided By Alcatel-Lucent

  • Videos // Oct 2010

    Microsoft Exchange 2010: Clean Up Your Inbox

    This video presents an overview of Microsoft Exchange 2010.

    Provided By Microsoft

  • Videos // Oct 2010

    Microsoft Exchange 2010: On the Go Doesn't Mean Out of Touch.

    This video presents an overview of Microsoft Exchange 2010.

    Provided By Microsoft

  • Videos // Oct 2010

    Microsoft Exchange 2010: One Stop Messaging

    This video presents an overview of Microsoft Exchange 2010.

    Provided By Microsoft

  • Videos // Jul 2010

    Oracle Active Guard

    Every organization needs a DR plan. The challenge with current DR solutions is that all of the investment made in your standby database stack is usually idle, waiting for a disaster to strike, while the main database stack must carry the full load of user transactions. This configuration can cause...

    Provided By Oracle

  • Videos // Sep 2010

    Oracle + Sun Product Strategy Webcast Series - Sun X86 Systems

    Oracle invites you to view our Oracle + Sun Product Strategy Webcast series. You'll get the chance to learn more about the combination of Sun and Oracle?and what it means for you. These informative, on-demand sessions offer strategies for Sun's major product lines related to the combination, explain how Oracle...

    Provided By Oracle

  • Videos // Mar 2015

    Turning the Tables on Cyber-Attacks

    Welcome to the future of Endpoint Protection. If you work on the front lines of IT security, you know that you have seconds to prevent an advanced cyber-attack. Watch this short on-demand webcast and learn how a new technology is really turning the tables on cyber-attacks.

    Provided By Intel Security

  • Videos // Feb 2015

    25 years of Firewall. What's Next?

    Over the past 25 years Firewalls have evolved to become one of the must-have cyber security solutions of today. But, are they ready to deal with the security threats of the next 25 years? Join James Turner, Senior Advisor and IT Security Analyst at IBRS Australia, and examine the new...

    Provided By Intel Security

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • Videos // Dec 2014

    IronKey Enterprise S250 and D250 Solutions Video

    IronKey delivers secure portable data storage solutions, including hardware-encrypted USB flash drives and external hard drives, for your mission-critical mobile workforce and the invaluable data they carry.

    Provided By IronKey

  • Videos // Dec 2014

    IronKey Enterprise Management Console Video

    Centrally administer access and usage policies across thousands of IronKey Enterprise flash drives and Workspace drives with the cloud-based or on-premise IronKey™ Enterprise Management Service or Server. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are...

    Provided By IronKey

  • Videos // Sep 2014

    Free Online Seminar - Securing Your Hybrid Data Centres

    Are you concerned about the security challenges in your hybrid data centre? Join us in a must-watch online seminar and learn how to tackle the security challenges of your hybrid data centre. Limited spots available. Register for free today.

    Provided By Intel Security

  • Videos // Oct 2014

    Video : Radboud University enhances security for over 40,000 users with Dell One Identity Manager

    Watch this video to learn how Radboud University improved business agility and enhanced security while controlling costs with Dell One Identity Manager.

    Provided By Intragen

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Provided By IBM

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Provided By IBM

  • Videos // Oct 2014

    Enterprise File Synch & Share Webcast

    Watch this webinar from IBM and Aberdeen Group to see highlights of the latest research on file synch / file share solutions to support personal productivity and collaboration.

    Provided By IBM

  • Videos // Sep 2014

    Maccabi Healthcare Services keeps Mobile Apps healthy

    How to keep your Mobile Apps healthy? Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there....

    Provided By HP

  • Videos // Sep 2014

    Webcast On-Demand: Maccabi Healthcare Services keeps Mobile Apps healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Watch the webinar to see how Maccabi...

    Provided By HP

  • Videos // Apr 2013

    Remote Office Data Protection with HP StoreOnce Catalyst

    Fastest disk backup and recovery in the industry. Fast—Meet shrinking backup windows and challenging RTO/RPO commitments; Flexible—Dedupe and replicate backup from anywhere to anywhere; Federated—Single deduplication engine deployed where you want with no need for data rehydration. Sponsored by HP and Intel® Xeon® Processor :

    Provided By HP & Intel® Xeon® Processor

  • Videos // Apr 2013

    Data Center Data Protection with HP StoreOnce Catalyst

    With the only federated deduplication solution available today, HP StoreOnce Backup with StoreOnce Catalyst overcomes the gaps, inefficiencies and costs associated with fragmented, first-generation deduplication technologies and delivers industry leading backup speeds. Sponsored by HP and Intel® Xeon® Processor : Intel, the...

    Provided By HP & Intel® Xeon® Processor

  • Videos // Jan 2014

    Box Case Study: Enterasys

    At Enterasys, a leading provider of wired and wireless network solutions, employees needed to share critical content on the go, from any device. Today, with Box, over 1100 employees -- from Sales to Engineering -- collaborate and share important information from wherever they are.

    Provided By Box

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Provided By Acronis