Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Videos // Dec 2014

    IronKey Enterprise Management Console Video

    Centrally administer access and usage policies across thousands of IronKey Enterprise flash drives and Workspace drives with the cloud-based or on-premise IronKey™ Enterprise Management Service or Server. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are...

    Sponsored By IronKey

  • Videos // Dec 2014

    IronKey Enterprise S250 and D250 Solutions Video

    IronKey delivers secure portable data storage solutions, including hardware-encrypted USB flash drives and external hard drives, for your mission-critical mobile workforce and the invaluable data they carry.

    Sponsored By IronKey

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • Videos // Oct 2014

    Case Study: TESCO uses CA Solutions to Monitor, Manage and Grow Their Business

    Check out these videos to see how Tesco has found success with CA’s solutions.

    Sponsored By CA Technologies

  • Videos // Oct 2014

    The New Security

    It’s as much about ensuring consumer confidence as it is about defense and protection—CA security software helps you do both with accelerated app delivery and improved customer engagement with strong and proven enterprise security.

    Sponsored By CA Technologies

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Sponsored By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Sponsored By IBM

  • Videos // Sep 2014

    Maccabi Healthcare Services keeps Mobile Apps healthy

    How to keep your Mobile Apps healthy? Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there....

    Sponsored By HP

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Sponsored By IBM

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Sponsored By IBM

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • Videos // Oct 2014

    Video : Radboud University enhances security for over 40,000 users with Dell One Identity Manager

    Watch this video to learn how Radboud University improved business agility and enhanced security while controlling costs with Dell One Identity Manager.

    Provided By Intragen

  • Videos // Sep 2014

    Free Online Seminar - Securing Your Hybrid Data Centres

    Are you concerned about the security challenges in your hybrid data centre? Join us in a must-watch online seminar and learn how to tackle the security challenges of your hybrid data centre. Limited spots available. Register for free today.

    Provided By White AU: McAfee/Intel

  • Videos // Sep 2014

    Webcast On-Demand: Maccabi Healthcare Services keeps Mobile Apps healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Watch the webinar to see how Maccabi...

    Provided By HP

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // Jun 2014

    Unlock the Four Layers of Security with Enterprise Mobility Management

    Watch this informative video to learn how to fortify your organization with four layers of security (data loss prevention, data encryption, secure remote access and a firewall) using Dell Enterprise Mobility Management solutions.

    Provided By Dell Software

  • Videos // Jun 2014

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Provided By Dell Software

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Provided By Dell Software

  • Videos // Apr 2014

    Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure Video

    The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So...

    Provided By VMware

  • Videos // Mar 2014

    The Power of One Video featuring HP VP Paul Durzan

    Introducing HP BladeSystem with HP OneView. One system and management platform. More efficient, faster, more reliable. Sponsored by HP and Intel® Xeon® Processor: Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in...

    Provided By HP & Intel® Xeon® Processor

  • Videos // Feb 2014

    Video Case Study: Sentara Healthcare

    Sentara Healthcare, a regional healthcare services provider based in Virginia, shares their success in using HP Performance Anywhere Software. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Provided By Hewlett-Packard (HP)

  • Videos // Feb 2014

    Video: IT Trust Curve Global Study: Irina Simmons

    Watch Irina Simmons, Chief Risk Officer at EMC, discuss the impact Trust can have on the success of top IT initiatives today.

    Provided By EMC

  • Videos // Jan 2014

    Box Case Study: Enterasys

    At Enterasys, a leading provider of wired and wireless network solutions, employees needed to share critical content on the go, from any device. Today, with Box, over 1100 employees -- from Sales to Engineering -- collaborate and share important information from wherever they are.

    Provided By Box

  • Videos // Nov 2013

    Video: Harness the era of big data

    Sophisticated ad targeting creates a win-win situation for both advertisers and consumers when the effective use of highly relevant messages and offers become personalized for the individual. Krishnan Parasuraman and Graeme Noseworthy from IBM explore this topic and discuss the common misconceptions and concepts surrounding big data driven targeted advertising....

    Provided By IBM

  • Videos // Nov 2013

    Video: Five Game Changing Use Cases for Big Data

    Hear Inhi Cho Suh and Jason Verlen from IBM share with you the five game changing use cases for big data. These game changing use cases will help you translate the promise of big data into tangible outcomes for your organization. This session will help you get started in deploying...

    Provided By IBM

  • Videos // Nov 2013

    Video: Smarter Analytics - Reducing the cost of risk at University of California

    The University of California, the largest higher education institution in the world, applied Smarter Analytics to significantly improve the enterprise risk information system for smarter decision-making. With ERMIS, UCOP was able to reduce the cost of risk from around $18 per thousand of operating budget to around $13.43, translating to...

    Provided By IBM

  • Videos // Oct 2013

    Drive your transformation to cloud computing

    Accelerate your journey to the cloud with EMC's new midrange solutions.

    Provided By EMC

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Oct 2014

    Video: Symantec Security Operation Centre

    Go behind the scenes with Peter Sparkes, Director of Managed Security Services for Symantec Asia Pacific and Japan on Symantec Security Operation’s Centre. Get the insights on what and how Symantec is doing globally to protect their customers and clients with Security Operations Centre strategically providing security against sophisticated threats....

    Sponsored By Symantec

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Sponsored By IBM

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • Videos // Sep 2014

    Maccabi Healthcare Services keeps Mobile Apps healthy

    How to keep your Mobile Apps healthy? Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there....

    Sponsored By HP

  • Videos // Oct 2014

    Case Study: TESCO uses CA Solutions to Monitor, Manage and Grow Their Business

    Check out these videos to see how Tesco has found success with CA’s solutions.

    Sponsored By CA Technologies

  • Videos // Oct 2014

    The New Security

    It’s as much about ensuring consumer confidence as it is about defense and protection—CA security software helps you do both with accelerated app delivery and improved customer engagement with strong and proven enterprise security.

    Sponsored By CA Technologies

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Sponsored By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Sponsored By IBM

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Sponsored By IBM

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • Videos // Dec 2014

    IronKey Enterprise Management Console Video

    Centrally administer access and usage policies across thousands of IronKey Enterprise flash drives and Workspace drives with the cloud-based or on-premise IronKey™ Enterprise Management Service or Server. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are...

    Sponsored By IronKey

  • Videos // Dec 2014

    IronKey Enterprise S250 and D250 Solutions Video

    IronKey delivers secure portable data storage solutions, including hardware-encrypted USB flash drives and external hard drives, for your mission-critical mobile workforce and the invaluable data they carry.

    Sponsored By IronKey

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // Sep 2014

    Webcast On-Demand: Maccabi Healthcare Services keeps Mobile Apps healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Watch the webinar to see how Maccabi...

    Provided By HP

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Mar 2012

    Webinar: Erase email complexity when moving to the cloud

    Cloud computing has led to a revolution in the way people work. The days of being tied to a desk PC are gone: many modern workers can remotely access the email, files and data they need. They are also bringing their own devices to work. Businesses are benefiting from moving...

    Provided By Mimecast

  • Videos // Sep 2013

    Video: Six Steps to Private Cloud

    Logicalis illustrates the six steps to enabling private cloud, which are fundamentally based on simplifying the data centre infrastructure. Logicalis enables private cloud infrastructure with EMC and Cisco, using the VSPEX platform to accelerate the transition to a fully automated and orchestrated data centre environment. This short and interesting...

    Provided By Logicalis

  • Videos // Jun 2011

    McAfee Cloud Security Platform with New Security Capabilities from Intel

    Scott Chasin, McAfee CTO, Content & Cloud, talks about the availability of Intel? Expressway Cloud Access 360 and Intel? Expressway Service Gateway as modules in the McAfee Cloud Security Platform. The unified platform provides identity and access control and protects the content during transit to and from the cloud -...

    Provided By Intel Corporation

  • Videos // Jun 2011

    What is Intel Trusted Execution Technology?

    When it comes to data on-premise or in the cloud...security is the number one concern for IT. Who better to address the benefits of hardware root of trust than Intel's own Senior Security Engineer. James Greene discusses why hardware integrity checking is an important component of security in the cloud...

    Provided By Intel Corporation

  • Videos // Jun 2011

    Securing the Cloud with Intel Trusted Execution Technology Usage Models

    Intel's Sr. Security Engineer, James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security posture in your cloud environment that are enabled with a hardware root of trust and Intel Trusted Execution Technology. Watch this...

    Provided By Intel Corporation

  • Videos // Oct 2011

    Open Data Center Alliance: Usage Model Requirements

    This video highlights the Open Data Center Alliance's initial publication delivery of eight usage model requirements for cloud as well as tracks the Alliance's growth since its inception in October 2010.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Intel Trusted Compute Pools Video

    Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud.

    Provided By Intel Corporation

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • Videos // Jul 2013

    Learn How To Be an IP Address Management Ninja

    Break free of spreadsheets once and for all and start managing your network like an IPAM ninja master! Learn about automation, consolidation, and control so you can become an IP address management ninja!

    Provided By SolarWinds

  • Videos // Jul 2013

    How-To Configure NetFlow on a Cisco Router

    SolarWinds Head Geek provides helpful tips for enabling NetFlow on Cisco routers. Discover how powerful NetFlow technology can help you determine the types of traffic on your network, where it's coming from, and where it's going. Watch Video>> (No Reg Required)

    Provided By SolarWinds

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // May 2013

    Continuous data protection for a business of any size

    Video, websites, email, client files, and application data on physical or virtual servers, is the type of information that is essential to business, and can seem endless. Now more than ever, organisations are on the lookout for simpler ways to manage and protect the growing amounts of content collected every...

    Provided By NETGEAR, Inc.