Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2009

    Cyber-Security Strategies in an Era of Change

    This webcast throws light on cyber security strategies in an era of change.

    Provided By CoreTrace

  • Webcasts // Jan 2009

    The Real World of Real Customers: Click Forensics Solves the Security Mystery

    The presenter will give an insider's perspective on the trials and tribulations of the industry leader in online traffic quality management establishing effective business processes around IT security. The attendee will learn from what went right during their early security experiences, and more importantly, what went wrong. The attendee will...

    Provided By CoreTrace

  • Webcasts // Jan 2009

    EndPoint Security With AirPatrol's Wireless EndPoint Client

    The presenter of this webcast describes the risks associated with wireless laptops in the Enterprise, and how AirPatrol Wireless EndPoint Client provides the solution to those risks.

    Provided By AirPatrol

  • Webcasts // Jan 2009

    An Executive Overview of AirPatrol's Wireless Locator System

    This webcast gives a high-level overview of AirPatrol's Wireless Locator System (WLS) management software. It gives a real-time, realistic example of how AirPatrol's Wireless Locator System is used to monitor and manage both 802.11 devices and cellular call events on a live wireless network. Combined with AirPatrol's proprietary WLS Cell/WLAN...

    Provided By AirPatrol

  • Webcasts // Jan 2010

    Exploring the IBM Research Labs (Part 2)

    In this webcast, the presenters explain in Part 2 of this 2-part series, they take a look at Many Eyes, a solution in data visualization and Smart Surveillance Solution (S3), a tool in physical security.

    Provided By UBM TechWeb

  • Webcasts // Dec 2008

    The Information Agenda: Unlocking Data

    In this webcast, the presenter talks about how companies are data rich and information poor, and the approaches, processes and tools necessary to leverage that data and unlock business value. The presenter also talks about some companies that have done this successfully.

    Provided By UBM TechWeb

  • Webcasts // Aug 2009

    Breaking the Cycle of Ineffective Anti-Malware

    EMA analysts are known for their willingness to give their honest assessments and opinions regardless of vendor agendas. The presenter will outline his candid thoughts on the few questions.

    Provided By CoreTrace

  • Webcasts // Mar 2010

    Secured eUSB - How to Protect Your Organization From Portable Devices

    With the advancement in technology there are many ways through which one can protect their laptops, computers and other devices but there is no solution for the protection of the portable devices. Portable devices are usually designed for the ease it offers while using like transportation. There is no such...

    Provided By Vimeo

  • Webcasts // Mar 2010

    Secure Document Collaboration for Microsoft SharePoint

    This webinar series helps the attendee gather information regarding data loss prevention technology. It also offers the attendee information on the first to market secure document management, and the collaboration with the industrial giants Microsoft technology. The other topics that are covered in this webinar include management of secure groups,...

    Provided By Vimeo

  • Webcasts // Aug 2009

    End Point Security - How to Protect Your Network From Portable Devices!

    Based on the research conducted by the Ponemon Institute 59 % of the people who lost their job due to misusing or taking the confidential company information with them either on DVD or using USB drives. The risk has dramatically increased in the intentional and unintentional data leaks and other...

    Provided By Vimeo

  • Webcasts // Jan 2010

    DLP - Easy as 1,2,3..

    Data loss is a negative impression on the organization which can have a drastic effect, such as reduced trust from customers, and from the partners, corporate value reduction, and loss of competitiveness as well as various criminal, and legal issues. It is very crucial for the organizations to protect sensitive...

    Provided By Vimeo

  • Webcasts // Jan 2010

    Sophos Endpoint Security and Data Protection Webinar

    This webinar features the Sophos Endpoint Security, and Data Protection, and the features of it. This webinar provides the attendee with an overview of the key, and basic features in the Sophos product, and at the same time provides a demonstration of the product. The product which is discussed is...

    Provided By Productive

  • Webcasts // Oct 2008

    Assuring the Recoverability of Your DB2 Databases

    To run a successful business the one needs to have more things than just a reliable hardware, software, and database. Most of the companies that are in the current market cannot afford downtime, and for the others they are not in the position of affording any. This webcast deals with...

    Provided By NEON Enterprise Software

  • Webcasts // Feb 2010

    Medical Software Company Enhances Lead Generation With HubSpot

    Valant Medical Solutions is a medical software company that provides psychiatrists and other mental health professionals with a web-based Electronic Medical Record (EMR). The presenter, Valant's director of marketing and communication, shares the success her company achieved with HubSpot.

    Provided By HubSpot

  • Webcasts // Feb 2014

    On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

    Provided By Message Systems

  • Webcasts // Jan 2009

    Kellogg Alumni Assess The Impasse In The Real Estate Industry

    If it is always darkest just before the dawn, then morning should be right around the corner for the real-estate industry.

    Provided By Northwestern University (Kellogg)

  • Webcasts // Jun 2010

    MBA (Full-Time And Part-Time) Convocation

    Kraft Chairman and CEO Irene Rosenfeld encourages graduates to take risks and be true to themselves.

    Provided By Northwestern University (Kellogg)

  • Webcasts // Jan 2012

    How to Improve Your VOIP Sound Quality

    In this Webcast the presenter describes about how to improve their VOIP sound quality. One can get a QoS device installed on their network. One of them is offered by D-link, it's called a DI101. And some firewalls or routers have it incorporated into their device as well so one...

    Provided By Videojug

  • Webcasts // Jan 2012

    Security for VoIP

    In this webcast, the presenter describes about security for VoIP. The presenter also explains about VoIP clipping, VoIP DoS attack, VoIP-related SPIT, caller ID spoofing, VoIP pharming and how viruses used to affect VoIP calls, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Protect a Wireless Connection

    If the user is concerned about hackers tapping into their wireless internet connection, and want to make it as secure as possible, in this Webcast the presenter describing about how to protect a wireless connection.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Choose an Internet Password

    In this Webcast the presenter describes about what is a "password" and how do one can choose that? The presenter also describes that password is that secret code word that one set up, it's an agreement between the user and their host, or email provider, service provider, that this is...

    Provided By Videojug

  • Webcasts // Jan 2012

    How To Make Your Wireless Network Secure

    In this Webcast, the presenter explains about how to make the wireless network as a secured one. While setting up their wireless network one also want to be concerned about security. It's a little bit more vulnerable than a wired network is but it doesn't have to be.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Tell if a Website Is Secure

    There are a number of ways that the user can tell whether a site that their working with is secure or not. One of the most common ways is a little icon on the bottom of their browser that's a padlock. In this Webcast, the presenter explains about website security.

    Provided By Videojug

  • Webcasts // Jan 2012

    Computer Security and Surfing

    In this Webcast, the presenter explains about computer security and surfing. Encryption is a process in which data is encoded so that it can be sent over lines, network lines, the Internet, and it is decoded on the end where it is received. That way, the information, if it's intercepted...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Enhance the Privacy of Your E-mail On Your Computer

    E-mail is relatively private. Relatively private because it does involve machines and servers that handle multiple pieces of mail and are administered by other people. In this Webcast, the presenter explains about how to enhance the privacy of their E-mail on their Computer.

    Provided By Videojug

  • Webcasts // Jan 2011

    Computer Security in the Virtual World

    In this Webcast, the presenter describes about computer security in the virtual world. The virtual world exists online on networks, peer to peer, from computer to computer, from server to server; basically anything that's not in the tangible world, but the world of binary code and packets. Binary code is...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Protect Your Computer From Identity Thieves

    In this Webcast, the presenter gives expert video advice on: how to protect their computer from identity thieves. A couple of the things that one can do to protect from people who are trying to steal information from one include blocking their computer from someone always having access to it...

    Provided By Videojug

  • Webcasts // Jan 2011

    Identity Theft: Computers and Laptops

    In this Webcast, the presenter gives expert video advice on: is it safe to sell an old laptop or computer? How can one prevent their laptop or computer from being stolen by identity thieves. In the event that one decide to sell their laptop or computer make sure that one...

    Provided By Videojug

  • Webcasts // Jan 2011

    Computer Security Breach

    In this Webcast, the presenter gives expert video advice on: computer security breach. Hackers want to gain entry to the computer for a couple of reasons. Often, it's just mischievous, it's the challenge of being able to do it. They're not looking for any personal gain and they're not looking...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Hack a Call Center Telephone System

    How To Hack A Call Center Menu System: Tired of touch-tone hell? In this Webcast, the presenter shows how to find phone numbers, cheat the computer and hack the call center system with the hacking tools.

    Provided By Videojug

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Nov 2009

    Webinar: Securing the Cloud Dec 10th, 2pm ET / 11am PT

    Cloud computing promises to provide vast computing power, reliable off-site data storage, wide availability, all at lower maintenance and investment costs. But recent cloud computing mishaps have underscored the need for consistent and thorough security policies implemented in the design stage. Hear security experts explain recent key learnings on...

    Provided By Enterprise Florida

  • Webcasts // Jan 2009

    A Roadmap to Risk Reduction: A Primer on Stopping Federal Network Data Leakage

    IBM offers the strategies, capabilities, and technologies necessary to help agencies preemptively protect Web applications from threats and address the complexities and growing costs of security risk management and compliance. This webcast shows how to stop network data leakage.

    Provided By IMB

  • Webcasts // Apr 2013

    Webcast: Getting Big Meaning out of Big Data

    There's a huge difference between capturing big data and actually tapping into its incredible potential. Learn how to unleash the true value of big data In this on-demand webcast.

    Provided By QlikTech

  • Webcasts // Jan 2009

    How Browser Exploits Lead to Web 2.0 Hacking

    Gone are the days when URL Filtering took care of all the issues that arise from a company's Internet bound traffic. With Web 2.0, dynamic and user-generated content is becoming the norm and hackers are using browser exploits to create backdoors. Every employee launching an Internet browser can open a...

    Provided By Zscaler

  • Webcasts // Jan 2009

    Newer Threats and Newer Defenses Against Web 2.0

    URL filtering has become a standard control to enforce policy for web traffic. However, with Web 2.0, where dynamic and user generated content becomes the norm, static URL databases are of limited effectiveness. The attendee of this webcast will learn how to tackle Web 2.0 challenges in today's tough economic...

    Provided By Zscaler

  • Webcasts // Jan 2009

    Risks and Defenses Against Web 2.0 Threats

    In today's tough economic environment, IT professionals are asked to do more with less. While Web 2.0 threats and browser exploits are growing, one has little or no Capital EXpenditure (CapEX) to acquire and deploy new security appliances and very tight Operating EXpenditure (OpEX) to manage them. IT management is...

    Provided By Zscaler

  • Webcasts // Jan 2009

    The Attacker Within: How Hackers Are Targeting Enterprises From the Inside-Out

    URL filtering has become a standard control within most enterprises to enforce policy for Internet bound traffic. However, with Web 2.0, as dynamic and user generated content becomes the norm, static URL databases are of limited effectiveness. The presenter explains how hackers are targeting enterprise inside-out.

    Provided By Zscaler

  • Webcasts // Jan 2009

    Web 2.0 Browser Exploits: What Hackers Know That You Don't

    Gone are the days when a simple URL Filtering solution took care of all the issues that arise from a company's Internet bound traffic. Every employee launching an Internet browser can open a gate into the enterprise network. These backdoors create a daunting list of new challenges such as Botnets/...

    Provided By Zscaler

  • Webcasts // Jan 2009

    Defending Against Web 2.0 and Browser Hacks & Attacks: Can SaaS Web Security Deliver Higher Protection & Lower Cost?

    The attendee of this webcast will learn about getting comprehensive Web 2.0 security within the URL filtering or proxy appliance budget.

    Provided By Zscaler