Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Apr 2014

    Live Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Cloud computing adoption is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station. ...

    Sponsored By EVault

  • Webcasts // Mar 2014

    Live Webcast: How to Protect and Recover SharePoint Data

    Microsoft SharePoint is an amazingly popular solution for sharing and centralizing control over important business data. Join us as we talk about the value of virtualizing your SharePoint infrastructure and the benefits of using Veeam® Backup & Replication™ to protect the valuable data that resides in your SharePoint databases. ...

    Sponsored By Veeam Software

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Sponsored By Veeam Software

  • Webcasts // Mar 2014

    Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Sponsored By Unitrends

  • Webcasts // Mar 2014

    On-demand Webcast - IT Risk Management: Why it is a Critical Component of Your Business Strategy

    In today’s business environment, ongoing increases in cyber-security attacks, “cyber-terrorism” and other IT security threats are forcing corporations to evolve their understanding of the value of IT risk management and its importance to business success. What used to be viewed as a compliance function is now considered a critical strategic...

    Sponsored By IBM

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

    Sponsored By ZDNet

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

    Sponsored By Message Systems

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Sponsored By Hewlett-Packard & Intel®

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Sponsored By Dell & Microsoft

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Mitigating Insider Threats

    IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automates, and tracks use of privileged account access. The solution helps protect clients at their most vulnerable points, from the people who have legitimate access and...

    Sponsored By IBM

  • Webcasts // Jan 2014

    Novell Cloud Security Service

    In this webcast, the presenter going to show the users' how they can harness the technology of the future with Novell Cloud Security Service. The presenter also going to explain about how service providers can manage multi-tenant SaaS infrastructures.

    Provided By Novell

  • Webcasts // Jan 2014

    Identity and Security Services Video

    In this webcast, the presenter gives an overview of Novell services for identity and security. The presenter also explains about different identity strategy, web access management, security audit, identity management deployment and password management.

    Provided By Novell

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Feb 2014

    On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

    Sponsored By ZDNet

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

    Sponsored By Message Systems

  • Webcasts // Mar 2014

    Live Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Sponsored By Unitrends

  • Webcasts // Mar 2014

    Live Webcast: How to Protect and Recover SharePoint Data

    Microsoft SharePoint is an amazingly popular solution for sharing and centralizing control over important business data. Join us as we talk about the value of virtualizing your SharePoint infrastructure and the benefits of using Veeam® Backup & Replication™ to protect the valuable data that resides in your SharePoint databases. ...

    Sponsored By Veeam Software

  • Webcasts // Mar 2014

    On-demand Webcast - IT Risk Management: Why it is a Critical Component of Your Business Strategy

    In today’s business environment, ongoing increases in cyber-security attacks, “cyber-terrorism” and other IT security threats are forcing corporations to evolve their understanding of the value of IT risk management and its importance to business success. What used to be viewed as a compliance function is now considered a critical strategic...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Powered by back-end databases, Web 2.0 and SOA for Web services, the dynamic nature of Web applications creates new challenges for security and compliance. The widespread growth of Web applications and the business value they deliver attracts hackers and cyber criminals to target Web-based applications to steal data, disrupt operations,...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Mitigating Insider Threats

    IBM Security Privileged Identity Manager can help organizations confidently defend their business against insider threats. Privileged Identity Manager provides a single solution that secures, automates, and tracks use of privileged account access. The solution helps protect clients at their most vulnerable points, from the people who have legitimate access and...

    Sponsored By IBM

  • Webcasts // Feb 2013

    Managing Access Security in a Multi-Perimeter World

    Today’s multi-perimeter world of mobile, cloud, and social interactions has transformed the enterprise, exposing your web applications and data to numerous external threats. Organizations need a new integrated approach for securing the wide variety of enterprise and web resources from any device, any service and any source. Join IBM and...

    Sponsored By IBM

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Apr 2014

    Live Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Cloud computing adoption is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station. ...

    Sponsored By EVault

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Sponsored By Dell & Microsoft

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Sponsored By Hewlett-Packard & Intel®

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Sponsored By Veeam Software

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    On-demand Webcast: Disaster Recovery Revelations– Fact, Fiction, and Survey Results

    What do you get when you survey over 1,800 backup and recovery experts over a 2 month period? The answers to some of your biggest data protection questions straight from your peers. Join Unitrends for an hour-long exploration of what the backup and recovery industry struggles with on a...

    Provided By Unitrends

  • Webcasts // Oct 2013

    On-demand Webcast - 8 do's and don'ts for building a private cloud storage solution

    If you’ve spent any time in IT these last few years, you’ve noticed this one little detail: users are storing a whole lot of stuff. Back in the day, users were storing just text-based documents and databases with rows and columns. That sure isn’t the case anymore. Now, users are...

    Provided By TechRepublic

  • Webcasts // Oct 2013

    On-demand Webcast - Creating the Extensible Data Center with Hybrid Clouds

    Can your current infrastructure meet the rapid surges in demand often caused by business changes, seasonality or just plain growth? For many, the very nature of IT is evolving as users demand faster provisioning, better scalability and more options to handle an ever-growing list of new applications and services that...

    Provided By VMware

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Apr 2011

    B2B Data Exchange and B2B Data Transformation Demo

    Find out how Informatica's B2B products?Data Transformation and Data Exchange?enable multi-enterprise data to be leveraged to support these strategic business objectives.

    Provided By Informatica

  • Webcasts // Apr 2010

    Safe & Secure: An Overview of Security Features in JBoss Application Platforms

    Is the Java environment secure? Have the locked down the applications? Are the exposed to the latest security issues? Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users...

    Provided By Red Hat

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • Webcasts // Jan 2012

    Manage Your Sybase Infrastructure With Sybase Control Center

    In this webcast, the presenter explains about Sybase Control Center (SCC) and how one can use SCC to manage, monitor, and troubleshoot one Sybase infrastructure. In this webcast, the presenter discusses the following topics: What products can be monitored with SCC ?, How to generate alerts and be notified of...

    Provided By Sybase

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Jan 2009

    AirWave Webcast: Best Practices in WLAN Security

    The presenter of this webcast discusses the eight most common security threats facing a WLAN infrastructure today and how to deal with them, followed by an open Q&A with the audience. Ends with a brief demo showing how the AirWave Management Platform can mitigate pressing security issues.

    Provided By Aruba Networks

  • Webcasts // Jan 2009

    Seamless Replica Management in VMware Environments With Site Recovery Manager

    Both before and after a site failure, most organizations struggle to effectively manage replicas in their VMware Site Recovery Manager environments. EMC Replication Manager automates the management of point-in-time replicas, accelerating backups, enabling more complete reporting, and saving time, staff, and computing resources. The attendee will learn how easy it...

    Provided By EMC

  • Webcasts // Nov 2008

    Deep Dive: Data De-Duplication for VMware Infrastructure Backups

    It is well known that how virtualization with VMware Infrastructure can save time, money, and energy while achieving more with the computer resources already owned. And people are no longer "Mystified" by data de-duplication - they know how it can eliminate redundant data to unburden the underlying hardware resources, and...

    Provided By EMC

  • Webcasts // Nov 2008

    What's New With EMC Backup and Recovery

    Interested in faster, more reliable backup, recovery - without compromise? An EMC data protection management solution can lower costs, reduce the risk of unprotected data, and improve overall operational efficiency. The attendee will learn why EMC's industry-leading portfolio is the one can trust. The attendee will also learn how EMC...

    Provided By EMC

  • Webcasts // Nov 2008

    Automating Governance, Risk and Compliance in the IT Infrastructure

    IT operations are challenged to keep up with the dynamic nature of the IT infrastructure. As new servers, applications, network devices and virtual systems are added, removed and reconfigured; IT operations must maintain compliance with internal governance, external regulatory mandates, industry best practices and service level agreements. Based on the...

    Provided By EMC

  • Webcasts // Sep 2008

    Plant and Asset Management in Life Sciences

    Pharmaceutical manufacturing operations face significant challenges related to the management of their plants and assets. Without consistent business processes, it's nearly impossible to guarantee the integrity and compliance of the engineering documentation associated with a processing plant - it's critical to have the right document at the right time. The...

    Provided By EMC

  • Webcasts // Sep 2008

    A Smarter Approach to Server Recovery

    Every day, company's backup challenges just get bigger. Administrators are faced with shrinking backup windows, but are also expected to increase service levels without spending more money. Add today's explosive data growth rates, and the challenge seems impossible. The next generation of backup solutions from EMC can help to meet...

    Provided By EMC

  • Webcasts // Sep 2008

    Establish Sustainable PCI DSS Compliance

    The Payment Card Industry Data Security Standard (PCI DSS) requires organizations to carefully manage and secure their cardholder data. The Standard's 230+ diverse requirements mandate that organizations employ infrastructure, identity, and information management systems. Only an integrated mix of technologies and processes can help businesses understand their PCI DSS compliance...

    Provided By EMC

  • Webcasts // Sep 2008

    Good Governance: How to Handle Fixed Content - Part 5

    A Good Governance strategy for fixed content enables the company to implement adaptable solutions and policies to enhance the value of content - while reducing complexities, risks, and costs. The attendee will learn best practices for managing reports, paper, and scanned documents. The presenter shows what a Good Governance strategy...

    Provided By EMC

  • Webcasts // Sep 2008

    Data Protection Management With EMC Backup Advisor

    Every day, company's backup challenges just get bigger. The administrators are not only faced with shrinking backup windows, but are also expected to increase service levels without spending more money. Add today's explosive data growth rates, and the challenge seems impossible. The next generation of backup solutions from EMC can...

    Provided By EMC

  • Webcasts // Sep 2008

    Leverage Your Experience With Tivoli Storage Manager

    A Tivoli Storage Manager environment can present numerous challenges to its administrators. TSM schedules can be difficult to meet, backups can take too long, and recovery time can exceed the requirements. Solutions from EMC and Brocade will help to meet these challenges - ultimately creating a more effective and efficient...

    Provided By EMC