Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Mar 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    White Is the New Black: Why White Data Really Matters

    The presenter have already brought their malicious data collection skills to an art level, but in order to get good verdicts (most importantly - low FP rate) their benign (or white) data must enjoy the same level of confidence as the malicious (or black) data.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Where the Wild Things Are: Encryption, Police Access and the User

    The government, frightened by companies' move to enable encryption by default and/or make encryption easier to use, sparked discussion about the use of a \"Golden key\" or implementation of backdoor access for law enforcement to decrypt an electronic device when the user refuses to do so.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Get Off My Lawn: Examining Change Through the Eyes of the Old Guard

    In this webcast, the presenter will examine personal privacy, contemporary threats, and the user's role in security, and other issues neatly written on Shmooballs and thrown at panelists. The panel is constructed of individuals who have been involved in information security for decades and may have developed a jaded, pessimistic,...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Rethinking Security's Role in Computer Science Education

    The role of security in computer science education needs to be reconsidered. There is little to no applied security content for the majority of undergraduate computer science students. Given that security is an afterthought in education, it should be no surprise that it ends up being an afterthought when those...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Building an Open Source Threat Intelligence Program

    This high-level overview centers on building a threat intelligence program and includes topics ranging from the threat intelligence lifecycle to specific tasks, in addition to lessons learned and what to keep in mind when developing the users own threat intelligence program.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Stored Password Security: The Adobe Guide to Keyless Decryption

    In this webcast, the presenter going to explain briefly about password storage techniques, popular implementations, their problems, and how to fix them, leveraging Recon-ng to demonstrate the risk associated with using each technique. Specifically address the fundamental flaws in Adobe's approach to password encryption and dive into the techniques the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Malware Development as the Evolution of Parasites

    In this webcast, the presenter will discuss how the evolution of parasites maps to the growth and development of malware. From the theoretical ground already explored in biology they can explain many of the trends in malware development and make predictions on how malware will evolve in the future.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Common Sense Security Framework

    Killing small businesses with over-regulation in the name of security while turning a blind eye to the fact that the cost of over-regulation is doing more harm than good. Distracting business owners from realistically focusing on the risks that apply to their companies, it's time to have an open, honest...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Threat Intelligence and Big Data Is It for Real, or Is It Hokum?

    An analysis of the current FUD surrounding the cyber threat intelligence industry. This webcast will explore how the users get to call themselves one and illustrate how a lot of folks are making a lot of money \"Guessing\" about the bad guys. This webcast will illustrate how cyber threat intelligence...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Detecting Malicious Activity and Malware on a Large Network

    In this webcast, the presenter will discuss the sorts of data sources available to network operators and big companies running their network, and how to sort through that data to find abuse, malicious activity, and malware. The bulk of the focus of this webcast will be on detecting botnet Command...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Mar 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Provided By ObserveIT

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Oct 2012

    Simplifying Disaster Protection for All Your Applications with VMware vCenter Site Recovery Manager and VMware vSphere Replication

    Traditional disaster recovery solutions are often expensive, complex and unreliable to meet business requirements. As a result, IT departments are hesitant to expand disaster protection beyond their most critical applications. With VMware vCenter™ Site Recovery Manager 5 (SRM), the market-leading disaster recovery product, all types of organizations can deploy the...

    Provided By VMware

  • Webcasts // Oct 2012

    Address Key Desktop Virtualization Use Cases with VMware View

    As desktop virtualization garners more momentum, IT organizations are looking for a solution that is cost-effective and easy to deploy, manage, and scale. VMware View meets these requirements with a proven desktop virtualization solution designed to optimize both end user freedom and IT management and control. View provides a comprehensive...

    Provided By VMware

  • Webcasts // Oct 2012

    Introduction to Virtual Desktop Infrastructure with VMware View

    Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...

    Provided By VMware

  • Webcasts // Oct 2012

    Quantifying the Business Value of VMware View - Webcast

    Many enterprises have discovered that the use of virtualization to support desktop workloads creates a range of significant benefits. These benefits include price efficiencies, improved IT management and greater agility and choice for end users. This VMware sponsored webcast with IDC will provide both quantitative measurement of the business...

    Provided By VMware

  • Webcasts // Jul 2013

    VMware vCenter Site Recovery Manager 5.1 QuickStart Series Part 1: SRM Preparation and Setup

    VMware vCenter™ Site Recovery Manager™ (SRM) is the market-leading disaster recovery product that complements VMware vSphere® to ensure the simplest and most reliable disaster protection for all virtualized applications. In this first webcast in a two-part series, we will discuss SRM architecture, setting up and configuring sites, and creating protection...

    Provided By VMware

  • Webcasts // Jul 2013

    VMware vCenter Site Recovery Manager 5.1 QuickStart Series Part 2: Using Recovery Plans For Disaster Recovery and Site Migration

    VMware vCenter™ Site Recovery Manager™ (SRM) is the market-leading disaster recovery product that complements VMware vSphere® to ensure the simplest and most reliable disaster protection for all virtualized applications. In this second session in a two-part series, we will discuss configuring recover plans, testing failover, executing planned migrations, reporting and...

    Provided By VMware

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Achieving PCI Compliance With Enhanced File Integrity Monitoring

    Compliance with PCI DSS is mandatory for merchants, no matter how many (or few) payment card transactions are processed each year or how much infrastructure is in scope. Failure to comply continues to result in stiff penalties. Even if one pass the first audit there's always next year. That's why...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Staying PCI Compliant in Virtual and Physical Environments

    Many organizations responsible for PCI compliance have stalled adoption of virtualization simply because they do not know if virtual servers are in scope for PCI compliance or how they would be audited. But increasingly, organizations are taking deliberate steps to stay PCI compliant while successfully rolling out virtualization across the...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Configuration Audit and Control: 10 Critical Factors to CCM Success

    As businesses have instituted internal, industry and government mandated regulatory compliance, the need for audit data to provide conformity has also become a necessity. However, traditional change management and configuration management tools do not comprehensively address all aspects of the vast configuration details inherent in complex IT infrastructures. Configuration audit...

    Provided By Tripwire

  • Webcasts // Jan 2009

    An Introduction to Security Visible Ops With Gene Kim

    Based on 10 years of research, the Security Visible Ops methodology describes how to link IT security and operational objectives in four practical steps by integrating security controls into IT operational, software development and project management processes. The attendee of this webcast will discover how the organization can use Security...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Controlling Virtualization Security Risks: Tips From the Experts

    The need for increased computing agility, coupled with the increasing cost and complexity of IT systems, has driven the rapid adoption of virtualization technologies. While virtualization has operational and economic rewards, the reality is that when information security controls are improperly implemented or neglected in virtualized environments, real security risks...

    Provided By Tripwire

  • Webcasts // May 2009

    Practical VM Security Techniques for Internal and External Virtualized Infrastructures

    Jumping onto the virtualization bandwagon makes great economic sense but can be risky if done without proper security measures. The presenter of this webcast discusses current trends in virtual infrastructure security while offering practical techniques for securely managing today's virtual infrastructures. The attendee will learn new approaches for virtualization security,...

    Provided By Trend Micro

  • Webcasts // Apr 2009

    VMware and CA Solutions for Ensuring Business Continuity With a Shrinking IT Budget

    In today's economic climate, data loss is something your business can't afford. The attendee will learn why companies are turning to VMware and CA for implementing cost-effective business continuity and disaster recovery solutions that combine backup, replication, continuous data protection and failover technologies with server virtualization to protect their businesses.

    Provided By VMware

  • Webcasts // Apr 2009

    Technical Track: VMware vCenter Data Recovery

    Research consistently ranks data protection among the top three pain points for customers of all sizes, including small and mid-size businesses. While VMware Infrastructure has provided fundamental capabilities that ease the time and effort to backup and restore virtual machines (using snapshots, for example), customers are looking for a more...

    Provided By VMware

  • Webcasts // Apr 2009

    New Cost Savings and Business Continuity Solutions for SMBs With VMware VSphere 4

    The attendee of this webcast will learn the compelling new IT solutions from VMware that enable Small and Midsize Businesses (SMBs) to significantly reduce IT costs and improve business continuity. VMware vSphere 4 delivers Always On IT to SMBs by delivering the high availability, performance and reliability of the VMware...

    Provided By VMware

  • Webcasts // Apr 2009

    Improve Application Security With VMware vSphere 4

    VMware vShield Zones, a new capability in VMware vSphere 4, enables network partitioning of virtual datacenters across logical organizational and trust boundaries, with virtualization-aware visibility and VMware VMotion compatibility. VMware vShield Zones provides convenient, secure virtualization of Internet-facing DMZs, compliance with firewalling and network segmentation requirements of PCI and regulatory...

    Provided By VMware

  • Webcasts // Jun 2009

    Securing Shared Virtual Infrastructure With Virtual Firewalls

    Enterprises and service providers are increasingly sharing physical hosts among multiple departments and customers, requiring strong isolation between virtual machines. The new VMware VMsafe APIs in VMware vSphere 4 enable virtual firewalls to deliver fine-grained policy control of virtual machine traffic and network segmentation in a shared virtual environment. Security...

    Provided By VMware

  • Webcasts // Mar 2009

    Security in the Cloud: Protecting Confidential Data in Cloud Computing Environments

    Cloud computing is opening up opportunities for cost savings and increased scalability of IT infrastructure. However, security concerns can sometimes obscure these benefits. The attendee will hear on a joint project using VMware and Third Brigade solutions that provides a secure, robust and cost-effective Electronic Health Records (EHR) infrastructure in...

    Provided By VMware

  • Webcasts // Mar 2009

    An Overview of Virtual Appliances

    Virtual appliances are fundamentally changing how enterprise software is developed, distributed, deployed and managed. The presenter of this webcast will provide an overview on solutions and programs around virtual appliances. The presenter will also highlight the key industry trends, benefits and use cases for ISVs and IHVs and various aspects...

    Provided By VMware

  • Webcasts // Mar 2012

    Introduction to VMware vSphere 5

    This presentation will be available to audience members until August 16, 2012 at 09:00 AM Pacific Daylight Time. The foundation of the new VMware Cloud infrastructure Suite is VMware vSphere5, the most trusted, widely deployed virtualization platform in the world. Architected to support the broadest range of virtual and...

    Provided By VMware

  • Webcasts // Mar 2012

    Introduction to VMware vSphere Storage Appliance

    This presentation will be available to audience members until August 23, 2012 at 09:00 AM Pacific Daylight Time. Business continuity is a top concern for small and midsize businesses (SMBs), who rely on their applications to keep their businesses running. VMware vSphere 5, the industry's leading virtualization platform, enables...

    Provided By VMware

  • Webcasts // Aug 2009

    Affordable Business Continuity for SMBs With VMware vSphere 4

    The attendee of this webcast will learn about the compelling new IT solutions from VMware that enable Small and Midsize Businesses (SMBs) to significantly improve the efficiency of their IT operations and deliver affordable business continuity. With VMware vSphere 4, SMBs can have the power of agility, protection and significant...

    Provided By VMware

  • Webcasts // Dec 2009

    HP Software-as-a-Service (SaaS): Getting Business Results Faster At a Lower Cost

    If you're like most companies, your IT budgets are being tightened while your organization is faced with pressure from the business to obtain quicker value from your investments. HP SaaS allows you to experience the full benefits of HP's Business Technology Optimization solutions immediately while reducing your upfront costs. Learn...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2010

    Data Backup Solutions

    HP? Data Vault: Automated Backup and Protection. Free White Paper!

    Provided By Hewlett-Packard (HP)