Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • Podcasts // Mar 2012

    Railscasts #336: Copycopter

    Copycopter provides a nice interface that clients can use to edit the text in a Rails application. In this podcast, the speaker explains how to deploy a Copycopter server using Heroku and integrate it in a Rails application through I18n.

    Provided By Oleksiy Kovyrin

  • Podcasts // Feb 2013

    Australian Building Products Leader Easily Achieves Disaster Recovery Objectives with Silver Peak

    See how Australia’s largest independent locally-owned manufacturer and distributor of wood-based building products, Gunnersen, has implemented Silver Peak Systems to ensure its recovery point objectives (RPO) are achieved. In the end Gunnersen was amazed by Silver Peak’s data mobility performance, price and deployment ease.

    Provided By Silver Peak Systems, Inc.

  • Podcasts // Feb 2013

    Forrester Video: The Next Generation Cloud and Your Network

    The wide area network, or WAN, is essential to next-generation cloud computing. This video featuring Forrester Research analyst Vanessa Alvarez looks at what is required for next-generation cloud implementations and the critical role the wide area network plays in the success of cloud deployments. Forrester's Vanessa Alvarez highlights the importance...

    Provided By Silver Peak Systems, Inc.

  • Podcasts // Jan 2013

    Symantec Certificate Intelligence Center - Overview

    In this podcast, the speaker going to discuss about the Symantec Certificate Intelligence Center who discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    What's New in ZENworks Endpoint Security Management 11

    In this podcast, the speaker going to explain about the latest features of ZESM 11 endpoint security management. The speaker will also explain how to deploy and configure integrated ZESM, UI for ZESM policies, location assignment policy and conflict resolution.

    Provided By Novell

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell

  • Podcasts // Jan 2013

    VPN Enforcement

    In this podcast, learn how to configure the VPN enforcement, locations and network environments, firewalls for office and VPN enforcement, VPN enforcement setup, trigger location, switch to location, and invoke VPN.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Endpoints With Novell Endpoint Security Management

    In this podcast, the speaker explains the need for ZENworks endpoint security management and how ZESM addresses those needs. ZENworks endpoint security is agent based solution for enforcing information security policies.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Security Best Practices From IDC and Novell

    To ensure that the users' infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. In this podcast, the speakers will discusses about the business endpoint security issues, business at the endpoint and endpoint case studies.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Infrastructure Using ZENworks Endpoint Security Management and ZENworks Network Access Control

    Organizations everywhere are providing users with more mobile devices - with the ability to connect to more networks - than ever before. Why? Because mobility equals productivity, and organizations benefit from every additional degree of mobile enablement they provide to their people. In this podcast, the speaker will help the...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Environment Using Novell ZENworks Endpoint Security Management and Novell ZENworks Network Access Control

    In this podcast, learn how the users' can leverage the power of ZENworks endpoint security management. The speaker will also examines ZENworks network access control across their enterprise, so their users can stay productive.

    Provided By Novell

  • Podcasts // Nov 2013

    Why care about managed services? Transformational benefits, that's why

    This mini paper and podcast features Lynn Koch discussing the benefits of managed services.

    Provided By IBM

  • Podcasts // May 2014

    Digging Deeper Into the IE Vulnerability

    Web browser vulnerabilities remain a fertile ground for hackers to harvest and mount attacks. Latest vulnerabilities found in Internet Explorer (IE) and urgent response from Microsoft highlights the fact that despite end of life announcements for old and less secure products, millions of users remain exposed to threats.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    AirSnare - Intrusion Detection Software for Windows

    In this podcast, the speaker explains about the AirSnare. It helps the user will learn about how to use AirSnare tool for Intrusion Detection System (IDS) setup. AirSnare is a very powerful and very useful for network IDS.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Cloud Security at Scale and What It Means for Your Application

    Cloud computing is all the rage, but few organizations have really thought about what security means for their applications and networks in cloud-centric deployments. Netflix is amongst the largest users of public cloud resources and consumes roughly 1/3 of all the US's downstream broadband at peak. In this podcast, the...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    VPN Pivoting With Cobalt Strike

    In this podcast, the speaker will discuss about VPN. It creates a network interface on the cobalt strike system and bridges this interface into the target's network. Through a covert VPN interface: the user system may sniff traffic on their target's network, act as a rogue server, or perform man-in-the-middle...

    Provided By SecurityTube.net

  • Podcasts // Oct 2014

    Migrating From Cisco ASA to Palo Alto Networks

    In this podcast, the speaker will show how easy it is to move to a next-generation security platform. The speaker also explains about the fundamental differences between Cisco ASA and Palo Alto Networks, and share migration best practices, examples and case studies.

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Modernizing Network Security in SCADA and Industrial Control Systems

    In this podcast, the speaker will discuss the nature of both existing and emerging cyber threats to ICS and why asset owners need to pay attention to them, strategies and frameworks for defending the user's ICS against these threats and next-generation technologies that enable fine-grain visibility, role-based access control, and...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    How Evolved \"419 Scammers\" Are Targeting the Enterprise

    In this podcast, the speaker will focus on these key takeaways: Remote Administration Tools (RATs) such as NetWire, that provide complete control over infected systems, silver spaniel attacks are specifically designed to evade traditional antivirus programs and indicators of compromise were observed for the NetWire RAT, and unit 42 recommends...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Jul 2014

    Hiding in Plain Sight - What's Really Happening on Your Network

    Today's cyber threats hide in plain sight amidst the user's network traffic, making them nearly impossible to defend against. In this podcast, the speaker will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 2,200 networks. The speaker also gives information on how...

    Provided By Palo Alto Medical Foundation

  • Podcasts // Sep 2014

    Blended Web and Database Attacks on Real-time, In-Memory Platforms

    It is well known there is a race going on in the \"Big data\" arena. One of the stronger competitors in the \"Big data\" market is real-time, in-memory platforms. An interesting thing about this platform and, the one the speakers will explain about specifically, is that it blends everything to...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    iOS App Integrity: Got Any?

    iOS apps are vulnerable to static analysis and attack through binary code patching. Incorporating jailbreak and debugger detection algorithms can be rendered useless with a quick binary patch. Once patched the app can be further exploited, its app data stolen, and even cloned.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Threat Modeling Made Interactive!

    Threat modeling is an important part of any secure development process. By identifying potential threats early in the development, the user can build effective mitigations into their system, rather than relying on costly patches and bug fixes. Existing techniques for modeling threats involve a whiteboard or some form of diagramming,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    BYOEF Video

    Learn how build your own a highly resilient, high-performance Brocade Ethernet fabric.

    Provided By Brocade

  • Podcasts // Jan 2014

    NetBackup 7.5 for VMware

    In this podcast, the speaker will explain about NetBackup 7.5 for VMware. Get a deep dive look into how the NetBackup Platform provides a superior solution for protecting virtual servers which includes a technology overview.

    Provided By SYMA S.C.

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // May 2008

    The Top Five Log Analysis Mistakes

    In this podcast, the speaker will explains how to avoid the log analysis mistakes and how to get the most value out of various log files, generated by systems, applications and security devices.

    Provided By O'Reilly

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By O'Reilly

  • Podcasts // Aug 2013

    Cloud Networking: What It Means for App Development

    In this podcast, the speaker will look at the application delivery controller's effect on the development, deployment and maintenance of applications, and web applications in particular. Starting with an overview of the evolution of load balancers into Application Delivery Controllers (ADCs), the speaker will then dive deeper into how the...

    Provided By O'Reilly

  • Podcasts // Feb 2014

    AIG Podcast

    Learn how AIG's Global Performance Architecture Group improved the performance of their services to deliver better experiences and payoffs for businesses and end-users alike. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Feb 2014

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Feb 2013

    The TELUS Leadership Philosophy

    TELUS' Dan Pontefract highlights the parallels TELUS sees between Skillsoft’s asset offerings and the TELUS Leadership Philosophy, which focuses on engagement, connection and collaboration before execution.

    Provided By SkillSoft

  • Podcasts // Oct 2011

    Railscasts #243: Beanstalkd and Stalker

    In this podcast, the speaker going to explain about Beanstalk. Beanstalk which is a fast and easy way to queue background tasks. Stalker provides a nice wrapper interface for creating these jobs.

    Provided By Oleksiy Kovyrin