Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Presentations // Feb 2013

    IBM Identity and Access Management

    This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data and processes, while enhancing business productivity.

    Sponsored By IBM

  • Presentations // Oct 2011

    Optimize Team Performance

    With the nature of work changing so rapidly, organizations are rethinking their teamwork strategy. The challenges of managing a distributed supply chain, improving the employee talent base, globalization, and revenue growth and innovation are all prompting organizations to improve teamwork. Many organizations are relying on virtual teams spread across locations...

    Provided By Cisco Systems, Inc.

  • Presentations // Oct 2011

    Improve Organizational Communications

    As an organization's workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Part of rethinking a communications strategy involves addressing dispersed audiences, flexible work environments, globalization challenges, and compliance issues. Information must be found, shared, and consumed in ways that are convenient...

    Provided By Cisco Systems, Inc.

  • Presentations // Jun 2010

    Equip the iPhone for Enterprise Productivity

    The iPhone's popularity has generated a high demand for its use within the enterprise. But employees want secure connectivity to critical business data while maintaining the freedom to access personal information and applications ? leaving IT administrators with a challenging task. With Sybase, you can strengthen iPhone adoption by...

    Provided By Sybase

  • Presentations // Jan 2010

    Microsoft Dynamics® CRM Online Customer Montage

    In this 3 minute video, two Microsoft Dynamics? CRM Online customers discuss how this new software service is not only helping them be more effective in their sales and marketing groups, but is also being adapted and customized to offer solutions well beyond what CRM is typically used for.

    Provided By Microsoft

  • Presentations // Mar 2009

    Learn How to Control Endpoints in this 3 minute video

    Security has evolved. It's no longer just about having anti-virus software and a firewall. Discover what critical steps and components you may be missing and how Symantec's Altiris endpoint management solutions can provide complete endpoint control and accelerate IT productivity and efficiency. View this product tour and register to download...

    Provided By Symantec

  • Presentations // Jan 2009

    Root Account Access Control and Monitoring Using Symark PowerBroker Free Trial

    Symark PowerBroker is a policy-driven, root account access control application that provides granular privileged access delegation, detailed logging and reporting, and centralized administration across heterogeneous UNIX and Linux environments. View this demo now to see how it provides UNIX and Linux security and accountability.

    Provided By Symark Software

  • Presentations // Dec 2008

    View this CA Video: Adventures in IT!

    Watch CA's short video -- The Adventures of IT Guy -- and see how CA XOsoft keeps the Exchange Server up-and-running so you never miss a beat!

    Provided By CA

  • Presentations // Dec 2008

    IBM Information on Demand and the Information Agenda: The Complete Story

    This demo explores IBM's Information on Demand strategy and discusses the 5 entry points to IOD -manage data over its lifetime, optimize content based operational and compliance processes, establish govern and deliver trusted information, optimize business performance, and the Information Agenda. View the presentation to learn how an Information...

    Provided By IBM

  • Presentations // Dec 2008

    CA Disaster Recovery Demo

    Disaster recovery describes the backup and recovery processes that are used to protect computing environments against the loss of data or services that are caused by a catastrophic event or natural disaster. After such events, you must get your systems back online quickly. Watch this brief presentation to see...

    Provided By CA

  • Presentations // Dec 2008

    CA Virtualization Support Demo

    Server virtualization is becoming widely used to help organizations reduce hardware and power costs. However, virtual machines (VMs) must be protected by using specific data protection technologies, such as CA ARCserve? Backup r12, which uses snapshot technologies to backup VMs, without affecting VM performance. Watch this presentation for a...

    Provided By CA

  • Presentations // Oct 2008

    Steelhead Mobile Demo

    This is a Video demonstration of how Steelhead Mobile speeds Windows File Sharing and SharePoint File Sharing. 13 min

    Provided By Riverbed

  • Presentations // May 2008

    Accelerating OS Deployment with Microsoft Windows Deployment Services

    Learn about the key differences between Microsoft? Windows Server? 2003 and Windows Server 2008 installations and about some of the options that can help simplify Windows Server 2008 deployments.

    Provided By Dell

  • Presentations // Jan 2005

    Patch Management Strategy

    This PowerPoint presentation outlines the effective attributes of effective patch management.

    Provided By Microsoft

  • Presentations // Apr 2004

    Firewall Basics for the Beginning User

    Designed for end-user training, this PowerPoint presentation offers a detailed, yet easy-to-understand explanation of how personal firewall software works, what it can and cannot protect against, and shows how to configure Kerio Personal Firewall.

    Provided By University of Arizona

  • Presentations // Feb 2013

    IBM Identity and Access Management

    This illustrated demo shows how IBM offers a smarter, business-driven approach to Identity and Access Management. IBM’s extensive integration capabilities can secure access to all your business data and processes, while enhancing business productivity.

    Sponsored By IBM

  • Presentations // Dec 2008

    IBM Information on Demand and the Information Agenda: The Complete Story

    This demo explores IBM's Information on Demand strategy and discusses the 5 entry points to IOD -manage data over its lifetime, optimize content based operational and compliance processes, establish govern and deliver trusted information, optimize business performance, and the Information Agenda. View the presentation to learn how an Information...

    Provided By IBM

  • Presentations // Jan 2010

    Microsoft Dynamics® CRM Online Customer Montage

    In this 3 minute video, two Microsoft Dynamics? CRM Online customers discuss how this new software service is not only helping them be more effective in their sales and marketing groups, but is also being adapted and customized to offer solutions well beyond what CRM is typically used for.

    Provided By Microsoft

  • Presentations // Jan 2005

    Patch Management Strategy

    This PowerPoint presentation outlines the effective attributes of effective patch management.

    Provided By Microsoft

  • Presentations // Dec 2008

    CA Disaster Recovery Demo

    Disaster recovery describes the backup and recovery processes that are used to protect computing environments against the loss of data or services that are caused by a catastrophic event or natural disaster. After such events, you must get your systems back online quickly. Watch this brief presentation to see...

    Provided By CA

  • Presentations // Dec 2008

    CA Virtualization Support Demo

    Server virtualization is becoming widely used to help organizations reduce hardware and power costs. However, virtual machines (VMs) must be protected by using specific data protection technologies, such as CA ARCserve? Backup r12, which uses snapshot technologies to backup VMs, without affecting VM performance. Watch this presentation for a...

    Provided By CA

  • Presentations // Dec 2008

    View this CA Video: Adventures in IT!

    Watch CA's short video -- The Adventures of IT Guy -- and see how CA XOsoft keeps the Exchange Server up-and-running so you never miss a beat!

    Provided By CA

  • Presentations // Mar 2009

    Learn How to Control Endpoints in this 3 minute video

    Security has evolved. It's no longer just about having anti-virus software and a firewall. Discover what critical steps and components you may be missing and how Symantec's Altiris endpoint management solutions can provide complete endpoint control and accelerate IT productivity and efficiency. View this product tour and register to download...

    Provided By Symantec

  • Presentations // May 2008

    Accelerating OS Deployment with Microsoft Windows Deployment Services

    Learn about the key differences between Microsoft? Windows Server? 2003 and Windows Server 2008 installations and about some of the options that can help simplify Windows Server 2008 deployments.

    Provided By Dell

  • Presentations // Jan 2009

    Root Account Access Control and Monitoring Using Symark PowerBroker Free Trial

    Symark PowerBroker is a policy-driven, root account access control application that provides granular privileged access delegation, detailed logging and reporting, and centralized administration across heterogeneous UNIX and Linux environments. View this demo now to see how it provides UNIX and Linux security and accountability.

    Provided By Symark Software

  • Presentations // Jun 2010

    Equip the iPhone for Enterprise Productivity

    The iPhone's popularity has generated a high demand for its use within the enterprise. But employees want secure connectivity to critical business data while maintaining the freedom to access personal information and applications ? leaving IT administrators with a challenging task. With Sybase, you can strengthen iPhone adoption by...

    Provided By Sybase

  • Presentations // Oct 2008

    Steelhead Mobile Demo

    This is a Video demonstration of how Steelhead Mobile speeds Windows File Sharing and SharePoint File Sharing. 13 min

    Provided By Riverbed

  • Presentations // Apr 2004

    Firewall Basics for the Beginning User

    Designed for end-user training, this PowerPoint presentation offers a detailed, yet easy-to-understand explanation of how personal firewall software works, what it can and cannot protect against, and shows how to configure Kerio Personal Firewall.

    Provided By University of Arizona

  • Presentations // Oct 2011

    Optimize Team Performance

    With the nature of work changing so rapidly, organizations are rethinking their teamwork strategy. The challenges of managing a distributed supply chain, improving the employee talent base, globalization, and revenue growth and innovation are all prompting organizations to improve teamwork. Many organizations are relying on virtual teams spread across locations...

    Provided By Cisco Systems, Inc.

  • Presentations // Oct 2011

    Improve Organizational Communications

    As an organization's workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Part of rethinking a communications strategy involves addressing dispersed audiences, flexible work environments, globalization challenges, and compliance issues. Information must be found, shared, and consumed in ways that are convenient...

    Provided By Cisco Systems, Inc.