Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2011

    Computer Security Breach

    In this Webcast, the presenter gives expert video advice on: computer security breach. Hackers want to gain entry to the computer for a couple of reasons. Often, it's just mischievous, it's the challenge of being able to do it. They're not looking for any personal gain and they're not looking...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Hack a Call Center Telephone System

    How To Hack A Call Center Menu System: Tired of touch-tone hell? In this Webcast, the presenter shows how to find phone numbers, cheat the computer and hack the call center system with the hacking tools.

    Provided By Videojug

  • Webcasts // Jan 2011

    Risk Maker Risk Taker: A Manager's Guide To Risk

    Risk management is a vital training topic for any organization. Whether you're implementing a new strategic plan or coordinating a single event, risk involves the culture, processes and structures through which potential opportunities and possible adverse effects are fully weighed and considered.

    Provided By CRM Learning

  • Webcasts // Jan 2011

    DataRoket

    DataRoket makes data integration simple. Getting the right data, to the right people at the right time is critical to cutting costs, increasing margins and becoming a competitive force in the own industry. Tapping "All" of the data; from one's databases, the applications, the web, social media and even just...

    Provided By DEMO

  • Webcasts // Dec 2010

    Obama~s Nominees To Federal Judgeships Lag

    The pace of confirmations to the federal bench has slowed in recent years, and President Obama's nominees to the federal district courts and appeals courts have faced considerable partisan resistance. Visiting Fellow the presenter says historically, well-qualified presidential nominees were routinely confirmed to the bench, but that's no longer the...

    Provided By Brookings Institution

  • Webcasts // Dec 2010

    Secure Data Management and Processing: Leveraging the Web for Secure Data Processing

    Kane County's Circuit Court Clerks office is leveraging the web to transform how orders of protection are accessed, completed, submitted, reviewed, and approved. The more integrated, automated processes translate into better protection for victims of domestic violence.

    Provided By Adobe Systems

  • Webcasts // Dec 2010

    How to Protect Your Company From Social Engineering Attacks

    The presenter is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security speaker. The presenter offers advice for companies on how to prepare themselves for potentially dangerous social engineering situations: basic security awareness training, the...

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    Business Insights Webcast: Security and Management Convergence on the Desktop (Level 100)

    As deployment planning for and deployment of Windows 7 gets underway, IT departments have the opportunity to re-evaluate investments, tools, and processes to ensure they are more responsive to user needs around client computing. Desktop management and security are two key elements in delivering an improved user experience, and aligning...

    Provided By Microsoft

  • Webcasts // Dec 2010

    Save YOUR Energy - Automating NERC CIP Compliance

    Save the energy - automate NERC CIP compliance. The attendees of this webcast will learn more about how one can automate the provisioning, configuration, tracking, and reporting of digital and analog assets to automate key NERC CIP processes.

    Provided By BMC Software

  • Webcasts // Dec 2010

    L0phtCrack 7: The Next Level of Password Auditing and Recovery

    L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn't halted since.

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    On demand webcast: Harnessing Oracle GRC to Control Your E-Business Suite 12.1 Upgrade

    Oracle E-Business Suite (EBS) 12.1 offers new capabilities for customers across the application suite, aligning with business objectives in every department, while lowering overall cost of ownership. Making the upgrade requires managing change by balancing risk and control with speed and performance. Implementation is recommended using a "design-in" approach to...

    Provided By Oracle

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    CA & Red Hat Present: Who's Securing Your JBoss Applications?

    Single-sign on, strong user authentication, and centralized security policy management are keys to securing any mission critical infrastructure. After this webcast, the will, gain a better understanding of how CA and Red Hat collaborate together Learn how and why customers use identity and access management tools in their mission critical...

    Provided By Red Hat

  • Webcasts // Nov 2010

    Orchestrate Digital Initiatives to Better the Customer Experience

    An increasing share of business' customer interactions take place online, and in response, businesses are shifting investments to digital venues. But these efforts don't always result in a compelling customer experience. How does a business supercharge its digital strategy and deliver a great experience to their clients? Attend this...

    Provided By IBM

  • Webcasts // Nov 2010

    HALDB Best Practices

    The attendees of this webcast will learn about IMS High Availability Large DataBases (HALDBs) in this informative webcast. The presenter interviewed several users and compiled a comprehensive set of best practices for moving to and maintaining HALDBs.

    Provided By BMC Software

  • Webcasts // Nov 2010

    Taming the Information Explosion with IBM System Storage

    Today's IT departments are being asked to meet tomorrow's storage challenges with yesterday's solutions. In this special announcement webcast, an IBM storage executive and a recognized storage analyst will discuss a host of new offerings in our storage portfolio. You'll learn about innovative technologies that are fully integrated and...

    Provided By IBM

  • Webcasts // Nov 2010

    Unisys ClearPath MCP 13.0 Security Overview

    The Unisys ClearPath MCP 13.0 Release includes many important security features, such as Secure Telnet, 2-tier secure WebEnabler, and secure TCPIPNATIVESERVICE port files, a new Role-Based Access Control subsystem for applications, Locum Real-time Monitor for real-time security monitoring, and many other incremental features. This technical webcast gives an overview of...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath OS 2200 Encryption Insights

    Encrypting sensitive data is an essential part of a strategy for protecting business assets and complying with governmental and industry regulations. This technical webcast includes insights gained from the use of Cipher API, the ClearPath OS 2200 product that uses to encrypt the stored data. After a brief overview, this...

    Provided By Unisys

  • Webcasts // Nov 2010

    TechTalk: 2048-Bit SSL Certificates - Are You Ready?

    Through this webcast one will discover how to efficiently manage this change and what actions one need to take now that will ease the transition to 2048-bit and still maintain the highest performance and security standards. In this webcast one will learn about: why SSL/TLS is moving to 2048-bit certificates...

    Provided By Citrix Systems

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Nov 2010

    What the Unisys Security Index Means for You

    National security, identity theft and credit card fraud are the top security concerns of the American public. These findings are the latest results of the, a biannual survey of America's sense of financial, national, Internet and personal security. So what do these results mean? What steps are Americans taking to...

    Provided By Unisys

  • Webcasts // Nov 2010

    7 Tips and 2 Models: Find a MSSP that Fits Your Business

    Tune in with John Ramsey and hear about 2 models for handling network security and 7 tips on choosing a managed security services provider. You'll learn the benefits of working with an MSSP, and how important a provider's industry knowledge is to their business. Part 2 of a 4 part...

    Provided By Megapath

  • Webcasts // Nov 2010

    Hosted VoIP: What about Service Quality?

    Listen to this podcast and Learn the basics on how hosted voice services work. Join Joel Thomas and get insight into small business advantages for adopting hosted voice, types of businesses that benefit most from hosted VoIP, and quality indicators for evaluating service providers.

    Provided By Megapath

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    MSDN Webcast: Security Talk Series: Fixing Application Security Issues the Right Way (Level 300)

    This Webcast show Fixing Application Security Issues the Right Way. What is security? It's about protecting assets: Tangible assets, such as a webpage or customer database, and fewer tangible assets, such as the company's reputation. A threat is a potential event that can adversely affect an asset, whereas a successful...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Detecting Data Leakage and Cyber Threats to PHI With Security Information Management

    In this webcast, the presenters say about healthcare entities address increasing compliance requirements and implement electronic health record systems, the relentless risk of data leakage and cyber threats becomes even more challenging. Protected Health Information (PHI) is vulnerable to both insider actions and outsider threats.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Understanding TCO and ROI for VMware View 4 - Purpose Built for Desktops

    Total cost of ownership (TCO) is one of the key criteria for evaluating desktop architecture. In this webcast, listen to VMware and IDC talk about measuring TCO and ROI for a VMware View? implementation. We cover IDC findings on real cost savings achieved by VMware View customers, the methodology used...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered.

    The enterprise-class public cloud is real. But how do you ensure you're leveraging the VMware technology you know and trust? Learn how VMware vCloud? and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers...

    Provided By VMware

  • Webcasts // Oct 2010

    TechNet Webcast: Hypervisor-Agnostic Management: Integrating VMware Into System Center (Level 300)

    In this webcast, presenters focus on best practice methods and real-world deployment examples for extending Microsoft System Center Operations Manager and Microsoft System Center Virtual Machine Manager to monitor and manage VMware. This podcast demonstrate the nworks Management Pack for VMware and nworks PRO Pack for VMware from Veeam Software...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Podcast: The Promise of Content-Aware Identity and Access Management

    The Promise of Content-Aware Identity and Access Management Published: 13 Oct 2010 This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy. Please view to learn more.

    Provided By CA

  • Webcasts // Oct 2010

    Dependable Data Protection That Saves You Time and Money

    Join us for a Webcast on two of the most important storage challenges facing enterprises today: backup and recovery. When systems crash and there is no way to recover your important data, you face the potential for lost revenue and customer dissatisfaction. Oracle's Dave Krenick, Open Storage Product Manager, and...

    Provided By Oracle

  • Webcasts // Oct 2010

    Cut Your Storage Costs in Half

    Around the world, companies such as yours are struggling to overcome the challenges associated with massive data growth and resource constraints. Tiered storage can help alleviate data management burdens as well as provide operational efficiencies and cost savings. Watch this webcast and find out how Oracle's extensive range of...

    Provided By Oracle

  • Webcasts // Oct 2010

    Accelerating Business with Integrated Content Management

    How can you turn exploding volumes of digital and paper based content into a business asset rather than a productivity killer? Explore Oracles' standards based solutions for the entire information lifecycle including document and records management, document capture and image processing, high performance flash and disk storage and highly...

    Provided By Oracle

  • Webcasts // Oct 2010

    Archive Strategy

    Oracle invites you to view our Oracle + Sun Product Strategy Webcast series. You'll get the chance to learn more about the combination of Sun and Oracle?and what it means for you. These informative, on-demand sessions offer strategies for Sun's major product lines related to the combination, explain how Oracle...

    Provided By Oracle

  • Webcasts // Oct 2010

    Best Practices for Entitlement Certification by Michael Liou

    Entitlements certification, also known as attestation, is becoming an increasingly common approach to responding to compliance audits. This process of asking business managers to validate the need for employees' sensitive access allows organizations to demonstrate action which minimize security risk by identifying and eliminating unnecessary access. During this webcast, Michael...

    Provided By CA

  • Webcasts // Oct 2010

    Mainframe Disaster Recovery Old Concepts and New Challenges

    Listen to this webcast and hear Jon Toigo discuss this primer for data protection and data recovery in mainframe storage. Jon will examine the requirements and the challenges for building an effective mainframe storage data protection and recovery plan, with emphasis on techniques for auditing and testing the plan for...

    Provided By CA

  • Webcasts // Oct 2010

    Business Insights Webcast: Desktop Lockdown: Securing Endpoints With Microsoft Security Products (Level 100)

    Securing network endpoints using Microsoft solutions provides flexibility to growing businesses that want to securely supply workers with the IT functionality they need. The benefits of deploying Microsoft Forefront technologies for identity and security management can be best viewed through three core principles, protect everywhere / access anywhere, integrate and...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2009

    Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

    o Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry's Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges...

    Provided By Reed Elsevier

  • Webcasts // Sep 2009

    Protecting Your Critical Data on a Budget

    The threats that organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared. It's against this backdrop that now there is need to defend against a rising level...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    Addressing the Unique IT Security Risks Posed by the Virtual Data Center

    According to a recent report, 93 per cent of organizations are deploying server virtualization, and companies typically have virtualized 40 per cent of their application workload. This growing ubiquity and the ability for business-critical guest systems to proliferate and seamlessly move - as well as migrate - across a data...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    What Security Professionals Can Learn From Real-World Network Data

    The presenter of this webcast will share key findings, analysis, and recommendations from their just released Application Usage and Risk Report, which is based on the actual network traffic in more than 60 large enterprises representing nearly a million users. Using real-world data provides network managers and CISOs a more...

    Provided By Reed Elsevier

  • Webcasts // May 2009

    Tapping Into the Power of Unified Communications Securely

    Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few...

    Provided By Reed Elsevier

  • Webcasts // Apr 2009

    Top IT Security Threats: How to Protect Your Users From Increasingly Sophisticated Attacks

    High-profile data breaches frequent the headlines, with countless smaller incidents happening almost daily. Data is under attack, and the frequency of assaults and sophistication of the methods employed are increasing. Rather than targeting the network directly, hackers often exploit the most vulnerable part of the security ecosystem - the users....

    Provided By Reed Elsevier

  • Webcasts // Mar 2009

    Web 2.0 Security in the Spotlight

    The Internet has changed. It's no longer just about Web browsing. It's dominated by Web 2.0 applications such as instant messaging, social networking, P2P, voice and video. Standalone URL filtering solutions are no longer sufficient to control these applications and secure the network. One needs a secure Web gateway that...

    Provided By Reed Elsevier

  • Webcasts // Jan 2009

    From Web Browsing to Social Networking: Securing Employee Internet Use in a Web 2.0 World

    The Internet has changed. It is no longer about e-mail and web browsing. Instead Internet traffic is dominated by Web 2.0 applications such as Video, Voice, IM (Instant Messaging), P2P, and social networking. These consumer-oriented applications are introduced by employees in the workplace to gain efficiencies, but they circumvent existing...

    Provided By Reed Elsevier

  • Webcasts // Nov 2008

    Making Threat Management More Manageable

    Human factors, often unaccounted for and masked by IDS products, and operations in the trenches, can create holes in intelligence coverage and performance gaps in incident operations. But, what role, in these modern integrated IT security times, does IDS plan in the great scheme of things? This webcast will help...

    Provided By Reed Elsevier

  • Webcasts // Jan 2010

    Enabling Real-Time Threat Analysis

    TIBCO's software is uniquely capable of correlating information about an agencies operations and performance. Agencies can anticipate and respond to threats and opportunities before they occur with information about expected behavior and business rules. The attendee will learn more about trends in Cyber attacks, threats and vulnerabilities and how Complex...

    Provided By TIBCO Software

  • Webcasts // Jan 2009

    Social Networking Global Survey Results & Practical Steps to Secure Your Organization

    A recent survey of 1,200 corporate Internet users showed that 77 percent of employees use social networks. And while their employers believe that only 10 percent of them use IPTV in the workplace, the true figure is actually 78 percent. Data points that further support the Internet has changed significantly...

    Provided By FaceTime Communications

  • Webcasts // Jan 2010

    Good to Great: Achieving Success With BPM/SOA

    The attendee of this webcast will learn how to set up a Center of Excellence. The presenter will walk participants through the steps for setting up a COE and putting organizations on track for sustainable success that delivers on the corporate vision.

    Provided By TIBCO Software

  • Webcasts // Jan 2009

    Enterprise Threat Management (ETM): Bringing Security Together Through Intelligence

    While IT security spending has been on the increase in recent years, unfortunately so have vulnerabilities and successful attacks. Enterprises are still being infected with undetected, targeted malware - evading traditional perimeter and host defenses. Professional hackers are in it for the profit now and are creating sophisticated ways to...

    Provided By Sourcefire

  • Webcasts // Jun 2010

    Big Issues In Government: Security

    This webcast is a part of Big Issues in Government series which talks about the ways states can address both cyber security threats and the increased role states must play in our overall national security efforts.

    Provided By Deloitte LLP

  • Webcasts // Jan 2011

    Political Change In China Is 'Almost Inevitable' But Beijing Has 'Nothing To Fear': Anson Chan

    Asian pro-democracy advocate Anson Chan says China has 'Nothing to fear' in allowing Hong Kong full democracy. China's Communist leadership has signaled the Special Administrative Region can elect its chief executive in 2017 and all members of the legislature three years later.

    Provided By INSEAD

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Jan 2011

    World-Famous Tenor Inspired To Create Leukemia Foundation

    Jos? Carreras, world-famous tenor and founder of the Jos? Carreras International Leukemia Foundation, talks about his goal of making leukemia completely curable. In a recent interview with IESE Prof. Johanna Mair, tenor Jos? Carreras discussed how the feelings of gratitude he felt towards those who helped him when he was...

    Provided By IESE School Of Business

  • Webcasts // Sep 2009

    Live Web Event: How Google Tackles IT Security - and What You Can Learn From It

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to...

    Provided By Google

  • Webcasts // Sep 2009

    Live Webinar: How Google Tackles IT Security - and What You Can Learn From It

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to...

    Provided By Google

  • Webcasts // Sep 2009

    Webinar: How Google Tackles IT Security - and What You Can Learn From It

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to...

    Provided By Google

  • Webcasts // Sep 2009

    Live Audiocast: How Google Tackles IT Security - and What You Can Learn From It

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to...

    Provided By Google

  • Webcasts // Sep 2009

    Live TechRepublic Webinar: How Google Tackles IT Security - and What You Can Learn From It

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to...

    Provided By Google

  • Webcasts // May 2009

    City of Orlando Cuts Costs by Over 66% by Moving Email and Apps into the Cloud

    When Conrad Cross, CIO for Orlando, got his budget cut and lost two experienced IT administrators, he knew he had to find another solution to replace the city's legacy email and communications infrastructure. After considering the usual options, Cross found a compelling value proposition in a cloud-based solution offered by...

    Provided By Google

  • Webcasts // Jun 2009

    Sunnybrook Discontinues Paper-based Policies and Procedures

    Sunnybrook Health Sciences Center relied on the Google Sharepoint Connector to access a wealth of information stored within different Microsoft Sharepoint Portals. Access to this stored information enabled Sunnybrook to discontinue paper-based policies and procedures altogether.

    Provided By Google

  • Webcasts // Mar 2010

    Geek out on the Cloud-Based Infrastructure of Google Apps

    On demand version of this webinar. Learn how Google's global, multi-tenant infrastructure meets the demands of today's Internet generation, and how your business can benefit from increased service levels, enhanced security and sustained economies of scale. Compare Google's zero RPO and RTO design targets for instant failover to your disaster...

    Provided By Google

  • Webcasts // Jul 2010

    Evaluating the Security of Google Apps

    On demand version of this webinar. Despite the ever rising popularity of cloud computing solutions, many IT professionals remain concerned about security and compliance. However, as one of the fastest growing cloud solutions, Google Apps is actively addressing these concerns by offering simple, powerful, and secure communication and collaboration tools...

    Provided By Google

  • Webcasts // Jul 2010

    Live TechRepublic Webinar: Evaluating the Security of Google Apps

    Despite the ever rising popularity of cloud computing solutions, many IT professionals remain concerned about security and compliance. However, as one of the fastest growing cloud solutions, Google Apps is actively addressing these concerns by offering simple, powerful, and secure communication and collaboration tools for organizations of all types and...

    Provided By Google

  • Webcasts // Oct 2011

    Konica Minolta on Transforming Enterprise IT Through Cloud Computing

    On demand version of this webinar. Konica Minolta Business Solutions U.S.A. (Konica Minolta) needed to easily integrate multiple corporate acquisitions, move from an old-style on-premise email system, and transform IT's role from tactical to strategic - so the company chose Google Apps. Today, Google Apps not only provides email, but...

    Provided By Google

  • Webcasts // Oct 2011

    Microsoft Exchange or Google Apps? One government agency goes Google

    On demand version of this webinar. Overview: James Ferreira, CIO for the New Mexico State Attorney General's office, had a choice to make to support his growing organization: upgrade to a more costly enterprise license for Microsoft Exchange or find a business grade alternative at a better price. Ferreira investigated...

    Provided By Google

  • Webcasts // Jan 2009

    Securing Your Constituents and Institutional Information - Avoiding Common IT Security Mistakes

    The presenter of this webcast will explore common mistakes in IT Security and what to do to avoid them. The presenter will examine ways security can be bypassed, and what should be done to avoid these security breaches. The presenter will consider the broad range of security, governance and risk...

    Provided By CIBER

  • Webcasts // Jan 2009

    IT Security Maturity in Higher Education

    The attendee will learn how to transform the institution's security program into an operationally mature program that permanently reduces risk.

    Provided By CIBER

  • Webcasts // Jan 2009

    IT Security Operational Maturity: Imaginary Superheroes or Sound Solutions?

    If the organization is relying on individual point solutions, personal heroism, or other "Silver bullets" to secure its Information Technology (IT) assets, it may be time to face the kryptonite. Point solutions and personal heroism may have worked for a while, but as technology has become more sophisticated, so have...

    Provided By CIBER

  • Webcasts // Jan 2009

    IT Security: Achieving Operational Maturity: Facing the ERP Security Challenge

    The presenter of this webcast will discuss the unique challenges of ensuring the security of IT data, systems and transactions with Lawson Software. The attendee will learn how to cost-effectively transform security programs and processes into proactive and operationally mature systems that address problems at their root causes. The presenter...

    Provided By CIBER

  • Webcasts // Jan 2010

    Innovation in Indiana - The INDOT PeopleSoft Implementation Story

    The presentation through this webinar is made by Jason Curlett, the Senior Oracle Consultant, COBER, Joy Koester, a fiscal Analyst as well as Reporting Manager, INDOT, Karen Hicks, a Business Manager of INDOT, in addition to the INDOT Project Accounting Manager, Shawn McMahan. This presentation enables one to know about...

    Provided By CIBER

  • Webcasts // Jan 2010

    Securing Your Constituents and Institutional Information

    Protecting information, and information systems, from unauthorized access is very important, as there are many number of security breach incidences. A survey by Educause 2008 says that security topped the list for collegiate IT, and mainly the impact was on an institution's finances, and resources. This webinar gives great inputs...

    Provided By CIBER

  • Webcasts // Jan 2010

    Business Success with SAP Retail and AFS

    Wolverine World Wide Inc is one among the global footwear giants, and the leader in the global marketer of the branded apparel, and footwear. Following the strategic plan for product innovation, global expansion, and brand development it recorded annual revenue of $1.2 billion in the year 2008 which is considered...

    Provided By CIBER

  • Webcasts // Jan 2010

    Lawson 9 Security: Maximizing your Investment

    Does one know the range of solutions and approaches the new Lawson security module provides? Hear about the new and improved Lawson security module, tips and techniques for implementation, and how it will improve the business. This webinar will teach the attendee how to: Plan for their auditing and compliance...

    Provided By CIBER

  • Webcasts // Jan 2010

    Making the Most of Your Lawson System

    Does one need to ensure that the new or existing system will perform effectively with new products? Learn the importance of Performance Testing and how a correctly executed Performance Test will help improve the business. This webinar will teach the attendee how to decide if Performance Testing is necessary for...

    Provided By CIBER

  • Webcasts // Jan 2010

    Maximizing ROI and Getting More from Your JDA MMS

    Today's retailers need to respond to a competitive marketplace through enhanced flexibility and speed. To do this, they need to transform their technology capabilities and keep their applications running efficiently. The JDA MMS solution/implementation is the best strategy for using a single application to work across your global branches to...

    Provided By CIBER

  • Webcasts // Jan 2010

    Storage Solutions for Managing Information Growth

    The speakers of this webcast are Joe Smothers, LSI Corporation Tom Hughes, CIBER, Inc.In. Here the attendee can learn how they can leverage affordable storage technology from IBM and CIBER while maintaining cost controls. Whatever be the company's size, one can know these four trends which addresses every business requirements....

    Provided By CIBER