Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Videos // Apr 2013

    Data Center Data Protection with HP StoreOnce Catalyst

    With the only federated deduplication solution available today, HP StoreOnce Backup with StoreOnce Catalyst overcomes the gaps, inefficiencies and costs associated with fragmented, first-generation deduplication technologies and delivers industry leading backup speeds. Sponsored by HP and Intel® Xeon® Processor : Intel, the...

    Provided By HP & Intel® Xeon® Processor

  • Videos // Jan 2014

    Box Case Study: Enterasys

    At Enterasys, a leading provider of wired and wireless network solutions, employees needed to share critical content on the go, from any device. Today, with Box, over 1100 employees -- from Sales to Engineering -- collaborate and share important information from wherever they are.

    Provided By Box

  • Videos // Oct 2014

    Video : Radboud University enhances security for over 40,000 users with Dell One Identity Manager

    Watch this video to learn how Radboud University improved business agility and enhanced security while controlling costs with Dell One Identity Manager.

    Provided By Intragen

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Provided By Imperva

  • Videos // Oct 2010

    See the possibilities of a future with an Application Fluent Network

    See how an Alcatel-Lucent Application Fluent Network can help you build a high performing, low complexity converged network. No matter what industry you're in, get the performance you need to meet your growing network demands: Enable real-time application delivery Adapt dynamically to the requirements of new users and applications...

    Provided By Alcatel-Lucent

  • Videos // Jan 2014

    ExtremeZ-IP Product Video

    With over a decade of experience and more than 7,000 organizations worldwide, ExtremeZ-IP has become the industry standard for seamlessly integrating Macs into enterprise environments. ExtremeZ-IP is the solution of choice for thousands of production workflows and is the only Windows AFP server product being actively maintained and supported since...

    Provided By Acronis

  • Videos // Apr 2014

    PST Archiving: What is it and How is it Done?

    Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10 software can help efficiently and effectively manage it in this short video.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Sync for CommVault Edge™

    Ensure workers can always get to their most recent files regardless of the computer they were created on. Thanks to automated synchronization of specified folders, they can share their work across their Simpana-protected laptops and desktops. Watch the video to see how Sync for CommVault EdgeTM can help make workers...

    Provided By CommVault Systems

  • Videos // Apr 2014

    CommVault Edge™ Mobile App Demo: Sharing on the Go

    In this short demo, see how you can retrieve and share information created on Simpana-protected laptops and desktops rapidly and securely through the CommVault EdgeTM mobile app. With CommVault Edge you’ll be able to deliver secure data portability and self-service access to employees’ personal “data cloud”.  Gain the Edge and...

    Provided By CommVault Systems

  • Videos // Apr 2014

    The Power of Singular Information Management

    Learn how CommVault's Singular Information Management® helps organizations use their data to drive business forward.

    Provided By CommVault Systems

  • Videos // Apr 2014

    Basics of Virtual Server Protection

    Phil Philip Curran (@PhilJPhilip Curran) discusses specific data protection challenges that result from growing virtual server and cloud deployments and how Modern Data Protection can address these challenges.Learn more about CommVault's Simpana Software: http://www.commvault.com/simpana-software

    Provided By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Provided By CommVault Systems

  • Videos // Aug 2013

    What is Adaptive Redaction? - Video

    Information management can become extremely complex and costly if not managed efficiently, but with effective Information Governance policy in place, you can stay ahead of the competition and uncover opportunities to drive business value. Adaptive Redaction is your assurance that critical information is kept safe. Learn more about Adaptive Redaction.

    Provided By Clearswift

  • Videos // Jul 2013

    How-To Configure NetFlow on a Cisco Router

    SolarWinds Head Geek provides helpful tips for enabling NetFlow on Cisco routers. Discover how powerful NetFlow technology can help you determine the types of traffic on your network, where it's coming from, and where it's going. Watch Video>> (No Reg Required)

    Provided By SolarWinds

  • Videos // Jul 2013

    Learn How To Be an IP Address Management Ninja

    Break free of spreadsheets once and for all and start managing your network like an IPAM ninja master! Learn about automation, consolidation, and control so you can become an IP address management ninja!

    Provided By SolarWinds

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Videos // May 2014

    IT Operations Management in Action

    A brief video that provides information on some best practices in handling performance and application issues.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • Videos // Mar 2012

    Webinar: Erase email complexity when moving to the cloud

    Cloud computing has led to a revolution in the way people work. The days of being tied to a desk PC are gone: many modern workers can remotely access the email, files and data they need. They are also bringing their own devices to work. Businesses are benefiting from moving...

    Provided By Mimecast

  • Videos // Sep 2013

    Video: Six Steps to Private Cloud

    Logicalis illustrates the six steps to enabling private cloud, which are fundamentally based on simplifying the data centre infrastructure. Logicalis enables private cloud infrastructure with EMC and Cisco, using the VSPEX platform to accelerate the transition to a fully automated and orchestrated data centre environment. This short and interesting...

    Provided By Logicalis

  • Videos // Oct 2011

    Intel Trusted Compute Pools Video

    Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud.

    Provided By Intel Corporation

  • Videos // Oct 2011

    Open Data Center Alliance: Usage Model Requirements

    This video highlights the Open Data Center Alliance's initial publication delivery of eight usage model requirements for cloud as well as tracks the Alliance's growth since its inception in October 2010.

    Provided By Intel Corporation

  • Videos // Aug 2012

    3rd Gen Intel Core vPro Processor Crimeware Protection

    Learn how embedded crimeware protection features built-in to 3rd generation Intel Core vPro processors safeguard data and thwart malware attacks.

    Provided By Intel Corporation

  • Videos // Aug 2012

    What is Intel® Core™ vPro™ Technology Animation

    What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.

    Provided By Intel Corporation

  • Videos // Aug 2012

    Managed PKI Solution from Symantec Enabled by Intel® vPro™ Technology Video

    Symantec Product Manager Dave Corcoran discussing the value Intel vPro Technology's Identity Protection Technology (IPT) with public key infrastructure (PKI) capabilities bring to enterprise security. Symantec is offering a managed PKI solution that works with third generation Intel Core vPro processors, which has the same high level of security as...

    Provided By Intel Corporation

  • Videos // Jun 2011

    McAfee Cloud Security Platform with New Security Capabilities from Intel

    Scott Chasin, McAfee CTO, Content & Cloud, talks about the availability of Intel? Expressway Cloud Access 360 and Intel? Expressway Service Gateway as modules in the McAfee Cloud Security Platform. The unified platform provides identity and access control and protects the content during transit to and from the cloud -...

    Provided By Intel Corporation

  • Videos // Aug 2012

    Intel Identity Protection Technology Animation

    Animation highlighting the business value of Intel Identity Protection with Public Key Infrastructure (Intel IPT with PKI). You could see IPT with protected transaction display as well as One Time Password (OTP) for enterprise usage.

    Provided By Intel Corporation

  • Videos // Jun 2011

    What is Intel Trusted Execution Technology?

    When it comes to data on-premise or in the cloud...security is the number one concern for IT. Who better to address the benefits of hardware root of trust than Intel's own Senior Security Engineer. James Greene discusses why hardware integrity checking is an important component of security in the cloud...

    Provided By Intel Corporation

  • Videos // Jun 2011

    Securing the Cloud with Intel Trusted Execution Technology Usage Models

    Intel's Sr. Security Engineer, James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security posture in your cloud environment that are enabled with a hardware root of trust and Intel Trusted Execution Technology. Watch this...

    Provided By Intel Corporation

  • Videos // Nov 2013

    Video: Smarter Analytics - Reducing the cost of risk at University of California

    The University of California, the largest higher education institution in the world, applied Smarter Analytics to significantly improve the enterprise risk information system for smarter decision-making. With ERMIS, UCOP was able to reduce the cost of risk from around $18 per thousand of operating budget to around $13.43, translating to...

    Provided By IBM

  • Videos // Jul 2011

    Novus SERP Flash Demo

    Novus Storage Enterprise Resource Planner (SERP) brings business intelligence to the storage environment. It tells you what business units are using which storage assets, when they use it, where it's being used, and how well it's being used. Watch this demo to see how SERP can help you gain insight...

    Provided By IBM

  • Videos // Jul 2011

    Automate processes with IBM Virtualization

    In the journey through virtualization, the automation of processes like provisioning and service management is essential to moving organizations to greater business effectiveness. This video describes how IBM® Virtualization solutions enable organizations to codify their best practices, processes and service level agreements to automate tasks and processes and improve business...

    Provided By IBM

  • Videos // Jul 2011

    IBM Virtualization Management Solutions

    Virtualization has the potential to make organizations more agile and responsive, empowering them to meet business goals by delivering levels of service quality and types of services that will add to their bottom line. This video describes how IBM Virtualization Management Solutions can help you manage physical and virtual resources...

    Provided By IBM

  • Videos // Apr 2014

    Private Modular Cloud—SME Video

    Organizations that are looking to work faster and with greater agility often look to a private cloud as a solution. Listen to IBM experts discuss key considerations for designing and deploying a private cloud solution.

    Provided By IBM

  • Videos // Nov 2013

    Video: Harness the era of big data

    Sophisticated ad targeting creates a win-win situation for both advertisers and consumers when the effective use of highly relevant messages and offers become personalized for the individual. Krishnan Parasuraman and Graeme Noseworthy from IBM explore this topic and discuss the common misconceptions and concepts surrounding big data driven targeted advertising....

    Provided By IBM

  • Videos // Nov 2013

    Video: Five Game Changing Use Cases for Big Data

    Hear Inhi Cho Suh and Jason Verlen from IBM share with you the five game changing use cases for big data. These game changing use cases will help you translate the promise of big data into tangible outcomes for your organization. This session will help you get started in deploying...

    Provided By IBM

  • Videos // Sep 2014

    Canonical 3 Minute Demo

    In this demo, Juju is used to deploy WebSphere, SugarCRM, Hadoop and more, in a matter of minutes on the IBM POWER8.

    Provided By IBM

  • Videos // Sep 2014

    Ubuntu Demo – POWER8 Launch Event (feat. Mark Shuttleworth)

    The right IT infrastructure choices are critical to business success, more so than ever before. Mobile, social, cloud, big data and analytics are fueling an explosion of data, and spawning new workloads and business models that are putting unprecedented demands on our IT environments. In this changed world the expectations...

    Provided By IBM

  • Videos // May 2014

    The Fast, Simple, Scalable and Complete Storage Solution

    Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability,...

    Provided By IBM