Microsoft

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Apr 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // Apr 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Apr 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....

    Sponsored By CA Technologies

  • White Papers // Apr 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Security essentials for CIO's enabling mobility - their device, your data

    IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.

    Sponsored By IBM

  • White Papers // Apr 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Apr 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Apr 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Apr 2015

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • White Papers // Apr 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • Webcasts // Apr 2015

    Reverse Engineering with Powershell

    Whether the users are performing incident response, black box code analysis, or analyzing malicious code, PowerShell is a powerful tool to add to the users reverse engineering tool arsenal. In this webcast, the presenter will explain how to use PowerShell to analyze binary file formats and reverse engineer managed and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Monitoring Using Powershell

    In this webcast, the presenter will give real world examples of how to use PowerShell for monitoring servers, websites, active directory, exchange, DNS, DHCP, anti-virus, WSUS patching, and notification using email and websites.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Advanced Powershell Threat - Lethal Client Side Attacks Using Powershell

    Powershell is an ideal platform for client side attacks as it is available on all the Windows machines. The presenter would see how easy and effective it is to use Powershell for various client side attacks like drive-by-downloads, malicious attachments, Java applets, human interface devices etc.

    Provided By SecurityTube.net

  • White Papers // Apr 2015

    Reduce backup costs with high-density energy-smart storage

    Bottom line—your IT infrastructure simply has to work, despite constrained budgets and constant data growth. Fortunately, virtualization has driven sweeping change, making deployments simpler, more scalable and agile regardless of the data center’s size. Discover how best-of-breed storage solutions are maximizing the benefits of virtualization by creating quantifiable improvements in...

    Provided By Nexsan by Imation

  • Webcasts // Apr 2015

    The Panasonic Toughpad FZ-E1

    The Panasonic Toughpad tablets help drive efficiency and productivity in ways that were never previously possible. It’s capable of operating outdoors in a variety of extreme and remote environments and it brings together the best of handheld, smartphone and barcode reader functionality into a single rugged and hard working tablet....

    Provided By Panasonic

  • White Papers // Apr 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Provided By NetApp

  • White Papers // Apr 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Provided By IBM

  • White Papers // Apr 2015

    A Managed File Transfer Center of Excellence

    Are you a visual thinker? This graphic representation provides the big picture for choosing the right person-centric file transfer solution for your organization. Read More..

    Provided By IBM

  • White Papers // Apr 2015

    Migrate to the New Style of IT

    Microsoft Windows Server 2003 Migration Program for enterprise businesses Microsoft will end support for Windows Server 2003 on 14 July 2015. This will have a dramatic impact on your business, and every moment you wait to begin your migration increases the costs, risks, and complexities you face. Read...

    Provided By HP

  • White Papers // Apr 2015

    5 Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper...

    Provided By HP

  • White Papers // Apr 2015

    Five Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper and...

    Provided By HP

  • Webcasts // Apr 2015

    Powershell and You: Using Microsoft's Incident Response Language

    Anyone can write useful security tools in PowerShell. With just a little bit of knowledge the user can automate almost anything. From advanced post-exploitation tasks to incident response tools, they can do it with PowerShell. This webcast will explain why they should learn a new language and cover the basics...

    Provided By SecurityTube.net

  • Videos // Apr 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

    Provided By IBM

  • White Papers // Apr 2015

    Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualisation — A Business Value Perspective (IDC)

    This document discusses the results that more comprehensive datacenter virtualisation delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualisation. Read more... Brought to you by HP and Intel® :

    Provided By HP and Intel UK

  • White Papers // Apr 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Apr 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Provided By Tectrade

  • Webcasts // Apr 2015

    Extreme Privilege Escalation on Windows 8/UEFI Systems

    It has come to light that state actors install implants in the BIOS. Let no one ever again question whether BIOS malware is practical or present in the wild. However, in practice attackers can install such implants without ever having physical access to the box. Exploits against the BIOS can...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

    Windows APIs are often a blackbox with poor documentation, taking input and spewing output with little visibility on what actually happens in the background. By analyzing (and abusing) the underlying functionality of these seemingly benign APIs, the presenter can effectively manipulate Windows into performing stealthy custom attacks bypassing the latest...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    What Happens in Windows 8 Stays in Windows 8

    Systems evolve over time, patches are applied, holes are fixed and new features are added. Windows 10 is the new flagship product of Microsoft, and as prepared as it can be for a world of white-, grey- and black-hat hackers.

    Provided By SecurityTube.net

  • Case Studies // Apr 2015

    Kent County Council Set to Save Over £2.7 Million While Fast Tracking XP Migration with VMware

    Kent County Council is able to rapidly accelerate the migration of its 4,000 devices away from Microsoft XP - saving over £560,000 in the process and causing minimal disruption to staff. Their challenges are to improve mobility, working flexibility, information security and business agility, migrating away from its aging Windows...

    Provided By VMware

  • White Papers // Apr 2015

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Provided By IBM

  • White Papers // Apr 2015

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM

  • White Papers // Apr 2015

    5 Ways Virtualization Can Protect Your Business Now

    Learn how VMware vSphere Data Protection gives you total protection for your virtual infrastructure and your most important applications, so you can minimize downtime and avoid lost data.

    Provided By VMware

  • White Papers // Apr 2015

    The Business Value of IBM zEnterprise System Deployments - IDC Report

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM

  • White Papers // Apr 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....

    Sponsored By CA Technologies

  • White Papers // Apr 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Apr 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // Apr 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Apr 2015

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • White Papers // Apr 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Apr 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Sponsored By IBM

  • White Papers // Apr 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Sponsored By IBM

  • White Papers // Apr 2015

    Security essentials for CIO's enabling mobility - their device, your data

    IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.

    Sponsored By IBM

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Apr 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • eBooks // Apr 2015

    Integrating and governing big data

    While the term “big data” has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM®...

    Provided By IBM

  • Videos // Apr 2015

    Using BlueMix to Develop Mobile Applications - Building an Android App using MobileData Cloud

    This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application. Download Now..

    Provided By IBM

  • eBooks // Apr 2015

    Executive's guide to the end of Windows XP support

    See how organizations are dealing with Windows XP's end-of-life deadline, the consequences of various migration (or stay-put) scenarios, and the obstacles encountered by companies moving off the OS.

    Provided By TechRepublic

  • White Papers // Apr 2015

    The Need for Third Party Security, Compliance & Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2015

    The Business Value of IBM zEnterprise System Deployments - IDC Report

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM

  • White Papers // Apr 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Apr 2015

    Need for Third Party Security, Compliance and Other Capabilities in Microsoft Office 365

    Microsoft Office 365 is a generalist product by its very nature, as are all cloud-based communication and collaboration tools offered to a mass audience. In short, Microsoft Office 365 cannot satisfy every requirement for every user at every organization. Consequently, Osterman Research believes that most mid-sized and large organizations...

    Provided By Symantec

  • White Papers // Apr 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Provided By IBM

  • Webcasts // Apr 2015

    The Panasonic Toughpad FZ-E1

    The Panasonic Toughpad tablets help drive efficiency and productivity in ways that were never previously possible. It’s capable of operating outdoors in a variety of extreme and remote environments and it brings together the best of handheld, smartphone and barcode reader functionality into a single rugged and hard working tablet....

    Provided By Panasonic

  • White Papers // Apr 2015

    Migrate to the New Style of IT

    Microsoft Windows Server 2003 Migration Program for enterprise businesses Microsoft will end support for Windows Server 2003 on 14 July 2015. This will have a dramatic impact on your business, and every moment you wait to begin your migration increases the costs, risks, and complexities you face. Read...

    Provided By HP

  • White Papers // Apr 2015

    5 Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper...

    Provided By HP

  • Webcasts // Apr 2015

    Mining Data From the Windows Registry

    Since being introduced in Windows 3.1, the Windows registry has continued to add new and interesting information as the operating system progresses. Storing data about executed programs, accessed files, USB devices, Internet browsing history, and even the directory structure of external devices, the registry is a truly a treasure trove...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Memory Forensics with Hyper-V Virtual Machines

    With the increased demand for memory forensics and more people using Windows Hyper-V as a hypervisor it's critical the DFIR community follows the proper triage process. Much like ESXi stores a .vmss file for each virtual machines memory Hyper-V stores them in a .bin and .vsv file, however currently it's...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Abusing Microsoft Kerberos Sorry You Guys Don't Get It

    Microsoft active directory uses Kerberos to handle authentication requests by default. However, if the domain is compromised, how bad can it really be? With the loss of the right hash, Kerberos can be completely compromised for years after the attacker gained access. Yes, it really is that bad.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Understanding TOCTTOU in the Windows Kernel Font Scaler Engine

    The font scaler engine is widely used in Microsoft Windows and Mac OS operating systems for rendering TrueType/OpenType fonts. It was first introduced in 1989. Later, to improve the performance of the Windows NT operating system, Microsoft decided to move the engine from user mode to kernel mode.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Windows Kernel Graphics Driver Attack Surface

    Ever wondered about the attack surface of graphics drivers on Windows? Are they similar to other drivers? Do they expose ioctl's? In this webcast, all those questions will be answered and more. Whether the users are a security researcher, a developer looking for some security guidance when writing these drivers,...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Getting Windows to Play with Itself: A Pen Testers Guide to Windows API Abuse

    Windows APIs are often a blackbox with poor documentation, taking input and spewing output with little visibility on what actually happens in the background. By reverse engineering (and abusing) some of these seemingly benign APIs, the users can effectively manipulate Windows into performing stealthy custom attacks using previously unknown persistent...

    Provided By SecurityTube.net

  • White Papers // Apr 2015

    Performance Comparison of VoIP Codecs on Multiple Operating Systems using IPv4 and IPv6

    In this paper, the performance of Voice over Internet Protocol (VoIP) for five different codecs, using IPv4 and IPv6 is established. The codecs tested were G.711.1, G.711.2, G.723.1, G.729.2 and the G.729.3 codec. The operating systems used were; Windows XP, Windows Vista and the Windows 7. Parameters considered for these...

    Provided By International Academy Publishing (IAP)

  • White Papers // Apr 2015

    Quick & Effective Windows XP Migration Checklist - #2

    The end of support date for Windows XP – April 8, 2014 – is rapidly approaching, after which the potential for security vulnerabilities will dramatically increase. Companies with many Windows XP machines still in use likely will need help upgrading in this compressed timeframe. Download this checklist to learn about...

    Provided By Lenovo

  • Case Studies // Apr 2015

    Media Giant Gains Better Business Visibility and Control Using an ERP Solution

    As a result of a merger, Qatar Media Corporation's (QMC) IT infrastructure was a mix of legacy systems and stand-alone applications. Many of QMC's existing applications were inadequate to meet the needs of its departments. In addition, the legacy systems often led to data that was incomplete or erroneous which...

    Provided By Microsoft

  • Case Studies // Apr 2015

    IT Solutions Provider Upgrades Operating System; Gains Efficiencies, Improves Productivity and Security

    KPIT Cummins, a global IT consulting and product engineering company, is constantly looking for the most efficient solution to streamline its processes and gain competitive advantage. The company saw the chance to do so with the release of Windows Server 2012 and Windows 8 Enterprise. It deployed Windows Server 2012...

    Provided By Microsoft

  • Case Studies // Apr 2015

    Datamex Automatisering: IT Firm Builds Windows Store App for Customer to Modernize Workplace

    Datamex Automatisering provides IT consulting services, specializing in providing IT infrastructure services; developing software applications, including financial accounting software for the Dutch market; and reselling PCs and mobile devices. These companies want more mobility and flexibility in their work environments to balance work/life commitments. Datamex helps customers achieve this by...

    Provided By Microsoft

  • Videos // Apr 2015

    [Webinar] Ageing IT infrastructure: When does it make sense to refresh?

    In difficult economic times, most businesses limit expenditures to the bare necessities, which means delaying even much-needed upgrades to the IT infrastructure. That saves money in the short-term, but over time, an aging infrastructure results in rising maintenance costs, inhibits growth and prevents organizations from capitalizing on the exciting benefits...

    Provided By Intel/Microsoft

  • White Papers // Apr 2015

    Get a Big Business Phone Communications Solution at a Small Business Price

    VoIP lets you make phone calls over the Internet, rather than a traditional phone line. It’s a hosted and flexible phone communications solution that works the way you do. Service is scalable to your business, manageability is simple via a customer web portal and there is no need for IT...

    Provided By Alaska Communications