Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Podcasts // Jul 2013

    Video: HP Networking Value Proposition

    Craig Hinkley, Vice President and General Manager of HP Networking Americas, shares why HP Networking offers a simplified network solution for better performance, scalability and reliability—and lower TCO.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: HP Virtual Application Networks

    In this brief video, see how businesses can use HP Virtual Application Networks to focus on connecting users to business applications and on the quality of experience—rather than on the details of configuring the network, device by device.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: Underwriters Laboratories future-proofs their network

    See how HP helped Underwriters Laboratories future-proof their network with solutions to fulfill their goals with a reliable, centrally managed network built on modular, scalable HP technologies that support their projected growth over the next ten years.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jun 2013

    vSphere Snapshot Overview

    Joe Desmond, VMware Certified Instructor, provides an overview of the vSphere Snapshot tool to support guest O/S administrators. Snapshots allow safe change to virtual machines without the worry of failed implementation.

    Provided By VMware

  • Podcasts // Jun 2013

    HP AppSystems for SAP HANA Use Case: Utilities

    See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy efficiency benchmarks and achieve energy savings and emission targets. Sponsored by HP and Intel® Xeon® Processors

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2013

    My Patch Compliance Rates are WHAT

    Are you alarmed by patch compliance rates that aren’t anywhere near 100 percent? Do you wonder why it takes so long to apply required patches to all of your systems? Many organizations struggle to effectively patch all of their systems, especially when they have a mix of Microsoft Windows,...

    Provided By IBM

  • Podcasts // Mar 2013

    Time Tracking Product Preview

    With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.

    Provided By Workday

  • Podcasts // Feb 2013

    Big Data, Analytics and Expert Integrated Systems

    On February 20th at 1:00 pm Eastern time, Redmonk analyst James Governor will lead a video chat with a variety of panelists to discuss big data, analytics and expert integrated systems. This video chat - sponsored by IBM PureSystems - continues a video series on the subject of "Opinionated Infrastructure."

    Provided By IBM

  • Podcasts // Jan 2013

    Enabling the Mobile Workforce with BI

    See how to get the targeted, interactive and personalized information you need to make informed decisions while you are away from the office.

    Provided By IBM

  • Podcasts // Jan 2013

    NetIQ

    In this podcast, the speaker explains how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate the users' security across the enterprise and public cloud access, and increase executive visibility by providing their management...

    Provided By Novell

  • Podcasts // Jan 2013

    Accelerate to the Cloud With Novell Cloud Manager

    In this podcast, learn how the users' can build and manage a secure and compliant private cloud with Novell cloud manager. And not just how they can do it, but why they would want to.

    Provided By Novell

  • Podcasts // Jan 2013

    Solving Cloud Security: Your Nightmare, a Hackers Dream

    In this podcast, the speakers examine the security vulnerabilities of cloud computing. The speaker will also explores the emerging trends in cloud security, examining the benefits and limitations of current tools and methods.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Novell Cloud Security

    Most enterprises focus their security strategies. In this podcast, the speakers will examine how Novell Cloud security can help the users' to manage their applications and functions and secure multiple SaaS applications.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Environment Using Novell ZENworks Endpoint Security Management and Novell ZENworks Network Access Control

    In this podcast, learn how the users' can leverage the power of ZENworks endpoint security management. The speaker will also examines ZENworks network access control across their enterprise, so their users can stay productive.

    Provided By Novell

  • Podcasts // Jan 2013

    Storage Control - Enforce Read Only Access and Disable Removable Storage Devices

    In this podcast, the speaker going to discuss about the storage device control which enforce read only access and disable removable storage devices. And also learn how to disable storage, enforce to read only access to storage and white list storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Endpoints With Novell Endpoint Security Management

    In this podcast, the speaker explains the need for ZENworks endpoint security management and how ZESM addresses those needs. ZENworks endpoint security is agent based solution for enforcing information security policies.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Infrastructure Using ZENworks Endpoint Security Management and ZENworks Network Access Control

    Organizations everywhere are providing users with more mobile devices - with the ability to connect to more networks - than ever before. Why? Because mobility equals productivity, and organizations benefit from every additional degree of mobile enablement they provide to their people. In this podcast, the speaker will help the...

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Security Best Practices From IDC and Novell

    To ensure that the users' infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. In this podcast, the speakers will discusses about the business endpoint security issues, business at the endpoint and endpoint case studies.

    Provided By Novell

  • Podcasts // Jan 2013

    The Path to the Private Cloud

    In this podcast, the speakers discuss the challenges and opportunities surrounding enterprise cloud computing, and introduce Novell Cloud Manager, an exciting new product that allows enterprises to create and manage their own private cloud.

    Provided By Novell

  • Podcasts // Jan 2013

    The Shift to Enterprise Cloud Computing

    In this podcast, the speaker going to explain about the shift to enterprise cloud computing. The speaker will discuss about how the technology is rapidly evolving in which applications are now portable were the portability requires security and management.

    Provided By Novell

  • Podcasts // Jan 2013

    What's New in ZENworks Endpoint Security Management 11

    In this podcast, the speaker going to explain about the latest features of ZESM 11 endpoint security management. The speaker will also explain how to deploy and configure integrated ZESM, UI for ZESM policies, location assignment policy and conflict resolution.

    Provided By Novell

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    The Cloud's Impact on the Economics of Branch Office Networking

    In this podcast, the speaker explains how cloud-enabled networking allows full functionality in the branch, enterprise-grade visibility and control in real-time, with the ability to provide automated remediation and security to even the most remote branch or teleworker.

    Provided By Aerohive Networks

  • Podcasts // Jan 2013

    Encryption - Encrypt Data Written to Removable Storage Devices

    Database users and applications need not be aware of the fact that the data they are accessing is stored in encrypted form. In this podcast, the speaker going to explain how to enforce encryption for files written to removable storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    VPN Enforcement

    In this podcast, learn how to configure the VPN enforcement, locations and network environments, firewalls for office and VPN enforcement, VPN enforcement setup, trigger location, switch to location, and invoke VPN.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell

  • Podcasts // Jan 2013

    Symantec Drive Encryption - High Leve

    Privacy is the ever increasing trend in the modern business world. In this podcast, the speaker going to give a brief introduction to Symantec's Drive Encryption product, find out more.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec Drive Encryption - Deep Dive

    In this podcast, the speaker going to explain about Symantec Drive Encryption and how it works including setup, passphrase recovery, and user experience. The speaker will also explain about the how encryptions are handled and whether is it compatible with all the systems.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec Certificate Intelligence Center - Overview

    In this podcast, the speaker going to discuss about the Symantec Certificate Intelligence Center who discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec Sealed Program

    Is the user a mobile app developer? Wrap their app with enterprise-grade security policies from the security leader, Symantec. In this podcast, learn how Symantec Sealed App enables enterprise with mobile productivity.

    Provided By Symantec Corp.

  • Podcasts // Dec 2012

    OnDemand: Faster VMs Guaranteed – No Hardware Required

    Learn how optimizing I/O at the source on virtual machines provides up to 50% or more application performance at a fraction of the cost of hardware. By eliminating unnecessary I/O traffic at the guest level, there is far less traffic pushed into the server, network, and storage. This OnDemand...

    Provided By Condusiv Technologies

  • Podcasts // Oct 2012

    Social Clienteling - Nurturing VIP Connections In-store and Beyond

    Join us to learn how leading retailers are re-imagining the guest and associate experience to better serve their best customers through the use of Social Clienteling, a 21st century approach to an age-old process.

    Provided By Salesforce.com

  • Podcasts // Oct 2012

    Oracle and Cloudera working together on Big Data

    Recent years have seen growing interest in various approaches to clouds and server virtualisation. So far, most cloud use cases focus on application servers. Yet, there are many reasons user organisations also need a "database cloud" for database management systems, data driven applications such as business intelligence and data warehousing...

    Provided By Oracle

  • Podcasts // Aug 2012

    Security for Virtualization Movie

    As the move to virtualization gathers momentum, many companies find themselves doing business in a diversified environment - one that includes traditional physical servers, cloud-based solutions and virtual machines. While the driving forces for virtualization are greater efficiency and lower costs, security needs to retain significant mind share. From day...

    Provided By Kaspersky Lab

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Podcasts // Jul 2012

    Railscasts #366: Sidekiq

    In this podcast, the speaker explains about Sidekiq which allows one to move jobs into the background for asynchronous processing. It uses threads instead of forks so it is much more efficient with memory compared to Resque.

    Provided By Oleksiy Kovyrin