Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Jun 2014

    Unlock the Four Layers of Security with Enterprise Mobility Management

    Watch this informative video to learn how to fortify your organization with four layers of security (data loss prevention, data encryption, secure remote access and a firewall) using Dell Enterprise Mobility Management solutions.

    Sponsored By Dell Software

  • Videos // Jun 2014

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Sponsored By Dell Software

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Sponsored By Dell Software

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Sponsored By IBM

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Tech Tips: Storage for VMware Horizon View Virtual Desktop Infrastructure Video

    The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So...

    Provided By VMware

  • Videos // Mar 2014

    The Power of One Video featuring HP VP Paul Durzan

    Introducing HP BladeSystem with HP OneView. One system and management platform. More efficient, faster, more reliable. Sponsored by HP and Intel® Xeon® Processor: Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in...

    Provided By HP & Intel® Xeon® Processor

  • Videos // Feb 2014

    Video Case Study: Sentara Healthcare

    Sentara Healthcare, a regional healthcare services provider based in Virginia, shares their success in using HP Performance Anywhere Software. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s privacy statement.

    Provided By Hewlett-Packard (HP)

  • Videos // Feb 2014

    Video: IT Trust Curve Global Study: Irina Simmons

    Watch Irina Simmons, Chief Risk Officer at EMC, discuss the impact Trust can have on the success of top IT initiatives today.

    Provided By EMC

  • Videos // Jan 2014

    Box Case Study: Enterasys

    At Enterasys, a leading provider of wired and wireless network solutions, employees needed to share critical content on the go, from any device. Today, with Box, over 1100 employees -- from Sales to Engineering -- collaborate and share important information from wherever they are.

    Provided By Box

  • Videos // Nov 2013

    Video: Harness the era of big data

    Sophisticated ad targeting creates a win-win situation for both advertisers and consumers when the effective use of highly relevant messages and offers become personalized for the individual. Krishnan Parasuraman and Graeme Noseworthy from IBM explore this topic and discuss the common misconceptions and concepts surrounding big data driven targeted advertising....

    Provided By IBM

  • Videos // Nov 2013

    Video: Five Game Changing Use Cases for Big Data

    Hear Inhi Cho Suh and Jason Verlen from IBM share with you the five game changing use cases for big data. These game changing use cases will help you translate the promise of big data into tangible outcomes for your organization. This session will help you get started in deploying...

    Provided By IBM

  • Videos // Nov 2013

    Video: Smarter Analytics - Reducing the cost of risk at University of California

    The University of California, the largest higher education institution in the world, applied Smarter Analytics to significantly improve the enterprise risk information system for smarter decision-making. With ERMIS, UCOP was able to reduce the cost of risk from around $18 per thousand of operating budget to around $13.43, translating to...

    Provided By IBM

  • Videos // Oct 2013

    Drive your transformation to cloud computing

    Accelerate your journey to the cloud with EMC's new midrange solutions.

    Provided By EMC

  • Videos // Oct 2013

    Oracle Health

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the health sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle

  • Videos // Oct 2013

    Oracle Telco

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the Telecommunications sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle

  • Videos // Oct 2013

    Oracle Utilities

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the Utilities sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle

  • Videos // Oct 2013

    Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure

    Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware...

    Provided By VMware

  • Videos // Oct 2013

    RSA Security Analytics Demo

    See how RSA Security Analytics helps security analysts detect and investigate threats often missed by other security tools to cut attacker free time from weeks to hours. This video will guide you through the investigation of a mock security attack.

    Provided By EMC

  • Videos // Oct 2013

    Rethinking traditional business continuity and disaster recovery

    In this video, Gordon MacArthur, Global Director, Assured Availability Services, for EMC Consulting at EMC, discusses business issues that are driving companies to reassess their approach to business continuity and disaster recovery.

    Provided By EMC

  • Videos // Sep 2013

    EMC VNXe: So Simple a 4th Grader Configured it for Vmware

    Setting up storage doesn't have to be complicated. Watch this short video to find out how simple setting up storage can be. Select the storage amount, exchange host and configure your host access and you'll be on your way to the storage you need in no time.

    Provided By EMC

  • Videos // Sep 2013

    Video: Six Steps to Private Cloud

    Logicalis illustrates the six steps to enabling private cloud, which are fundamentally based on simplifying the data centre infrastructure. Logicalis enables private cloud infrastructure with EMC and Cisco, using the VSPEX platform to accelerate the transition to a fully automated and orchestrated data centre environment. This short and interesting...

    Provided By Logicalis

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • Videos // Aug 2013

    What is Adaptive Redaction? - Video

    Information management can become extremely complex and costly if not managed efficiently, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover opportunities to drive business value. Adaptive Redaction is your assurance that critical information is kept safe. Learn more about Adaptive Redaction.

    Provided By Clearswift

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Sponsored By IBM

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • Videos // Apr 2014

    Keep Servers Up and Running and Attackers in the Dark

    An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate...

    Sponsored By F5

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Sponsored By Dell Software

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Sponsored By Acronis

  • Videos // May 2014

    Video: 10 Critical Requirements for Cloud Applications

    Many application vendors now claim they're in the cloud. But being committed to this new delivery model requires more than just saying it. So what must-haves should you look for in a cloud vendor? Watch this video to see the 10 Critical Requirements for Cloud Applications.

    Sponsored By Workday

  • Videos // Jun 2014

    Unlock the Four Layers of Security with Enterprise Mobility Management

    Watch this informative video to learn how to fortify your organization with four layers of security (data loss prevention, data encryption, secure remote access and a firewall) using Dell Enterprise Mobility Management solutions.

    Sponsored By Dell Software

  • Videos // Jun 2014

    Match Mobility Needs to Your Workforce with Enterprise Mobility Management

    Watch this short video to find out how to tailor your organization's mobility needs to end users, line-of-business owners and IT decision makers with Enterprise Mobility Management solutions from Dell Software.

    Sponsored By Dell Software

  • Videos // Apr 2014

    SmartCloud Managed Backup Portal Demo

    As your business expands, your data footprint grows even faster. The information you collect is valuable for better business insights and analytics. But with more data comes more responsibility to protect and secure it. IBM SmartCloud Managed Backup Service can provide you with the scalability to back up increasing amounts...

    Sponsored By IBM

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Mar 2012

    Webinar: Erase email complexity when moving to the cloud

    Cloud computing has led to a revolution in the way people work. The days of being tied to a desk PC are gone: many modern workers can remotely access the email, files and data they need. They are also bringing their own devices to work. Businesses are benefiting from moving...

    Provided By Mimecast

  • Videos // Sep 2013

    Video: Six Steps to Private Cloud

    Logicalis illustrates the six steps to enabling private cloud, which are fundamentally based on simplifying the data centre infrastructure. Logicalis enables private cloud infrastructure with EMC and Cisco, using the VSPEX platform to accelerate the transition to a fully automated and orchestrated data centre environment. This short and interesting...

    Provided By Logicalis

  • Videos // Jun 2011

    McAfee Cloud Security Platform with New Security Capabilities from Intel

    Scott Chasin, McAfee CTO, Content & Cloud, talks about the availability of Intel? Expressway Cloud Access 360 and Intel? Expressway Service Gateway as modules in the McAfee Cloud Security Platform. The unified platform provides identity and access control and protects the content during transit to and from the cloud -...

    Provided By Intel Corporation

  • Videos // Jun 2011

    What is Intel Trusted Execution Technology?

    When it comes to data on-premise or in the cloud...security is the number one concern for IT. Who better to address the benefits of hardware root of trust than Intel's own Senior Security Engineer. James Greene discusses why hardware integrity checking is an important component of security in the cloud...

    Provided By Intel Corporation

  • Videos // Jun 2011

    Securing the Cloud with Intel Trusted Execution Technology Usage Models

    Intel's Sr. Security Engineer, James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security posture in your cloud environment that are enabled with a hardware root of trust and Intel Trusted Execution Technology. Watch this...

    Provided By Intel Corporation

  • Videos // Oct 2011

    Open Data Center Alliance: Usage Model Requirements

    This video highlights the Open Data Center Alliance's initial publication delivery of eight usage model requirements for cloud as well as tracks the Alliance's growth since its inception in October 2010.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Intel Trusted Compute Pools Video

    Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud.

    Provided By Intel Corporation

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • Videos // Jul 2013

    Learn How To Be an IP Address Management Ninja

    Break free of spreadsheets once and for all and start managing your network like an IPAM ninja master! Learn about automation, consolidation, and control so you can become an IP address management ninja!

    Provided By SolarWinds

  • Videos // Jul 2013

    How-To Configure NetFlow on a Cisco Router

    SolarWinds Head Geek provides helpful tips for enabling NetFlow on Cisco routers. Discover how powerful NetFlow technology can help you determine the types of traffic on your network, where it's coming from, and where it's going. Watch Video>> (No Reg Required)

    Provided By SolarWinds

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // May 2013

    Continuous data protection for a business of any size

    Video, websites, email, client files, and application data on physical or virtual servers, is the type of information that is essential to business, and can seem endless. Now more than ever, organisations are on the lookout for simpler ways to manage and protect the growing amounts of content collected every...

    Provided By NETGEAR, Inc.

  • Videos // Oct 2011

    TechRepublic Live 2011: Cybercrime updated

    A video recording of a presentation by Debra Littlejohn Shinder given at TechRepublic Live 2011 in Louisville, KY, on September 28th, 2011.

    Provided By TechRepublic.com

  • Videos // Aug 2013

    Webinar: Advanced Malware And APT Attacks

    Watch this webinar to learn: * What are the traits of Advanced Persistent Threats (APT)? * What are the infection vectors? * What are the advanced techniques? * Who are the threat actors?

    Provided By FireEye

  • Videos // Aug 2013

    Webinar: How Client-side Attacks Evade Traditional Security Controls

    Hosted by Ben Wilson, Senior Systems Engineer, CISSP, GXPN Bypassing traditional security controls is becoming a commodity. Hear more and watch a demo about how this happens, and what you can do to protect your network.

    Provided By FireEye

  • Videos // Oct 2012

    Short Video: Introducing Webroot SecureAnywhere Business - Endpoint Protection

    Until now, security has been a huge waste of time. It has been a lead weight on your system - an irritation. For the last 20 years, security has been anything but secure. That stops now. Introducing Webroot SecureAnywhere Business - Endpoint Protection - A completely new way of looking...

    Provided By Webroot Software

  • Videos // Oct 2013

    Oracle Health

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the health sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle

  • Videos // Oct 2013

    Oracle Telco

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the Telecommunications sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle

  • Videos // Oct 2013

    Oracle Utilities

    A real-life scenario is mapped out in this 2-minute video on how Business Analytics can assist in identifying, analysing and solving real-life problems. This video takes a look at the potential a Business Analytics tool has in the Utilities sector. Oracle Exalytics In-Memory Machine helps organisations of all sizes benefit...

    Provided By Oracle