Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Aug 2012

    GTAC 2009 - Fighting Layout Bugs

    So the user have unit tests, integration tests, and maybe even frontend tests, and they know that their web application does what it is supposed to do. But what about layout bugs? How do they ensure, that every page looks like the designers wanted it to look like? In this...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    Best Practices for Microsoft Exchange Post-Migration Operations

    In this webcast, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post Exchange migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration...

    Provided By Dell Software

  • Webcasts // Jul 2012

    Conquering Costly Compression for Oracle Backups

    Running database backups with Oracle's standard compression feature can require tremendous amounts of time - and deploying Oracle's Advanced Compression solution across the business is expensive. Protecting your Oracle data shouldn't be costly and risky! In this on-demand webcast, see how LiteSpeed Engine for Oracle cuts storage costs, reduces...

    Provided By Dell Software

  • Webcasts // Jul 2012

    The Lazy Programmer's Guide to Secure Computing

    In this webcast, the presenter starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. The presenter also defines the Principle Of Least Authority(POLA), and explain why it is a best practice for secure programming.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    LISP Part 1: Problem Statement, Architecture and Protocol Description

    In this webcast, the presenter will describe the initial problem statement LISP was created for. LISP is taking the overloaded semantics of the IP address, where a network device's identity address and location address are separated so one can keep one of the addresses fixed and while changing the other.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    Internet Systems Consortium's SIE & Google Protobufs

    ISC SIE (Security Information Exchange) is a trusted, private framework for information sharing in the Internet Security field. Participants can operate real time sensors that upload and/or inject live data to SIE, and other participants can subscribe to this data either in real time, or by query access, or by...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    UpSizeR: Synthetically Scaling Up a Given Database State

    E-commerce and social networking services must ensure that their systems are scalable. Engineering for rapid growth requires intensive testing with scaled-up datasets. Although, such a larger dataset is synthetically generated, it must be similar to a real dataset if it is to be useful. This webcast presents UpSizeR, a tool...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Defeating the Password Anti-Pattern with Open Standards

    Passwords can leak through a variety of channels: users tend to re-use passwords across web sites, get phished, attacked by malware, etc. Most would agree that password-based authentication is not very secure. So why do the people still live in an online world dominated by passwords? In this webcast the...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    2010 Google Faculty Summit: Cloud Computing and Software Security

    Software-as-a-service can provide great benefits, such as ubiquitous, reliable access to data, but cloud computing also raises new challenges and opportunities for computer security. In this webcast, the presenter is briefly outline some of these issues and potential research topics in cloud security, with examples from Google's past and current...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Black Hat Spam SEO

    For some time, attackers have leveraged Search Engine Optimization (SEO) techniques in order to promote malicious web content targeting end users. Google has researched this phenomenon and recently announced that fake antivirus pages now represent 60% of the malware associated with popular search terms and these attacks continue to grow...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    Blinding Curiosity: Supporting User Preferences and Privacy Within Workplace Awareness Applicastions

    Awareness systems are an emerging class of technologies that enhance communication and connections between people in both business and social settings. MyUnity, a prototype awareness platform designed and developed at FXPAL for use in the workplace collects a myriad of data from a variety of sensors and sources, fuses the...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    Douglas Crockford: Principles of Security

    In this webcast, the presenter outlines the basic principles of designing secure software, with a focus on web applications. The presenter starts at the beginning (almost literally - with the invention of language itself) and makes a strong case for designing secure software based on fundamental principles rather than specific...

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2012

    6.033: Computer Systems Engineering

    In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2012

    A Geek's Guide to Digital Forensics

    In this webcast, the presenter will provide a technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting. The presenter will also provide a brief background on forensics and important concepts including acquisition and verification techniques.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Crockford on JavaScript - Part 5: The End of All Things

    In this webcast, the presenter will concludes his five-part lecture series on the JavaScript programming language. The presenter going to review about the issues related to security and performance in JavaScript.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Cisco Unified CallManager and IP Phone Security

    In this webcast, the presenter going to focus on CUCM fundamentals & implementation, review of the security by default feature introduced in CUCM 8.x, upgrading CUCM 7.x to 8.x, & the rollback method from CUCM 8.x to 7.x.

    Provided By Cisco Systems

  • Webcasts // Apr 2012

    Mark Kawakami: Finger Tips: Lessons Learned From Building a Touch-Based Experience

    In this webcast, the presenter takes the user through some lessons learned in building touch-based experiences for one of the most popular websites on the internet. The presenter also going to explain about the I-hacker.

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Protect Critical Oracle Data Without Risk - or Destroying the Budget!

    Running database backups with Oracle's standard compression feature can require tremendous amounts of time - and deploying Oracle's Advanced Compression solution across the business is expensive. Protecting your Oracle data shouldn't be costly and risky! In this on-demand webcast, see how LiteSpeed Engine for Oracle cuts storage costs, reduces...

    Provided By Dell Software

  • Webcasts // Apr 2012

    Optimize Your Data Center with SPARC and Solaris 11

    More capacity, higher availability, greater security, lower costs - the demands being placed on IT are growing every day. Can your servers and operating systems keep up with these demands? Or do legacy systems add complexity, impede performance and drain resources? Watch our new Webcast to see how Oracle's Solaris...

    Provided By Oracle

  • Webcasts // Mar 2012

    Introduction to VMware vSphere Storage Appliance

    This presentation will be available to audience members until August 23, 2012 at 09:00 AM Pacific Daylight Time. Business continuity is a top concern for small and midsize businesses (SMBs), who rely on their applications to keep their businesses running. VMware vSphere 5, the industry's leading virtualization platform, enables...

    Provided By VMware

  • Webcasts // Mar 2012

    Matt Seeley: Lessons From the Yahoo! Tablet Front Page

    In this webcast, the presenter shares lessons learned from building the tablet version, including an overview of the tablet landscape, best practices to deliver UIs to multiple viewports, and @font-face and @media rule usage across iPad and Galaxy.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Optimizing Android Apps With Google Analytics

    Thousands of apps have taken advantage of Google Analytics' native Android tracking capabilities to improve the adoption and usability of Android Apps. This webcast covers best practices for tracking apps on mobile, TV and other devices. The presenter also shows the user how to gain actionable insights from new tracking...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Taking Android to Work

    More and more people are bringing Android devices into enterprise environments. In this webcast, the presenters will cover general enterprise adoption considerations and related Android features. They will also provide an overview of security issues, managed internal app development, corporate app directories, and an in-depth look at a sample implementation...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Building Android Apps for Google TV

    In this webcast, learn how to create new apps or enhance existing Android apps for Google TV. Session includes an overview of the platform, best practices, demos, and discussion about the fantastic opportunities Google TV creates for developers.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Oracle Storage Strategy Update

    New digital data will double over the next four years, and is expected to increase from 1,200 exabytes in 2010 to 35,000 exabytes in 2020, a growth of 29X. Architecturally, the world has evolved so that applications, data, and storage are separated. The challenge, then, is to align these key...

    Provided By Oracle

  • Webcasts // Mar 2012

    Introduction to VMware vSphere 5

    This presentation will be available to audience members until August 16, 2012 at 09:00 AM Pacific Daylight Time. The foundation of the new VMware Cloud infrastructure Suite is VMware vSphere5, the most trusted, widely deployed virtualization platform in the world. Architected to support the broadest range of virtual and...

    Provided By VMware

  • Webcasts // Mar 2012

    Google I/O 2011: Evading Pirates and Stopping Vampires

    In this webcast, the presenter explains about best practices for using the License Verification Library and In-App Purchases on Android Market. It also explains how to integrate a server-side component for license validation and content delivery, describing the reference implementation that they built using App Engine.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: How to NFC

    Gingerbread brings a comprehensive NFC reader/writer API, and some modest but surprisingly powerful P2P support. In this webcast, the presenter explains about how the users' should care about NFC technology, what kinds of applications are possible right now, and best practices for deployment.

    Provided By Oleksiy Kovyrin

  • Webcasts // Feb 2012

    Avi Rubin: All Your Devices Can Be Hacked

    Could someone hack the pacemaker? In this Webcast, the presenter explains how hackers are compromising cars, smartphones and medical devices, and warns about the dangers of an increasingly hack-able world.

    Provided By TED Conferences

  • Webcasts // Feb 2012

    SEI Technologies Forum: Software, Security, and Resiliency

    In this webcast, the presenter going to explain about the opening remarks at the SEI technologies forum. The presenter will explain how the SEI technologies can help the organizations applied and improved in their software technologies.

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2012

    Mikko Hypponen: Three Types of Online Attack

    In this Webcast, the presenter discusses about online attack. The presenter also explains about three types of online attack on the people privacy and data - and only two are considered crimes.

    Provided By TED Conferences

  • Webcasts // Jan 2012

    netmap: A Novel Framework for Fast Packet I/O

    Many applications (routers, traffic monitors, firewalls, etc.) need to send and receive packets at line rate even on very fast links. In this webcast, the presenter presents netmap, a novel framework that enables commodity operating systems to handle the millions of packets per seconds traversing 1..10 Gbit/s links, without requiring...

    Provided By USENIX

  • Webcasts // Jan 2012

    IT Trends to Watch in 2012

    In this webcast, the presenters discuss about IT trends for 2012. The presenters also discuss under the topics of consumerization of IT, where security threats will come from, the rise of big data and the cloud, and the IT economy.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    Google On Stupid vs. Money, SSL Search Firefox & HTML5 SEO

    In this webcast, the presenter explains about Google tools. Firefox is testing defaulting users to SSL Google which can be bad for marketers. Google made a change for some browsers that might label Google search traffic as direct referrer.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    VMware VNetwork Distributed Switch and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    Cisco Nexus 1000V and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch. This is a good introduction to some of the new features with vSphere 4.0 virtual networking.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    VMware Distributed Power Management and VSphere

    This webcast introduces the VMware Distributed Power Management (DPM) and how it can be leveraged to save power and money in the data center. The VMware Engineer discusses how it can be leveraged to improve the efficiencies in the data center and leverage it for power and cost savings. about...

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    Safe Surfing: Narcissist Invades Your Computer

    In this webcast, the presenter discusses about the suspicious behavior in the internet such as persistent pop-ups; the computer or connection slow down considerably; repeated re-boots; mouse or keyboard freeze; strange messages and alerts. The presenter also discusses the Safe Surfing method to protect the computer from malware.

    Provided By Internet Archive

  • Webcasts // Jan 2012

    Making HIPAA Compliant Data Security Simpler to Manage

    In this webcast, the presenter going to discusses about how Dell and Citrix's mobile clinical computing takes an advantage of tested and validated desktop virtualization architectures designed specifically for healthcare providers and integrates them into technologies that have already invested.

    Provided By Dell

  • Webcasts // Jan 2012

    Email Management Service: Email Continuity

    In this webcast, the presenter going to disuses about e-mail management service. The presenter also discusses about e-mail continuity which provides a Dell-hosted solution that effectively eliminates email downtime, no matter what the cause: local infrastructure outages, database corruption, Active Directory corruption, configuration errors, viruses or malware.

    Provided By Dell

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By TrendMicro

  • Webcasts // Jan 2009

    Lifecycle Quality Management; Infusing and Automating Quality at Every Phase

    When one leave quality to the end, or as someone else's responsibility, it can result in applications that fail to meet the original goals, require costly rework or miss critical release dates. To prevent these problems, one need an advanced approach to managing overall quality throughout the software development lifecycle....

    Provided By Borland

  • Webcasts // Jan 2011

    Database Monitoring & SIEM - Beyond Compliance to Data Breach and Fraud Detection

    In this webcast, the presenters say about the database activity monitoring is a key requirement of many compliance mandates - monitoring and logging all database activity to ensure that sensitive data is being access appropriately, and by the right people. But when DAM and SIEM are integrated, the combination provides...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Moving Past the Hype: SIEM Best Practices for Daily Security Operations

    In this webcast, the presenters say about all heard the claims, but can one really use a SIEM to detect and respond to real time threats? What are the indications that an advanced attack or insider breach is underway, or about to occur? Learn both best practices and pitfalls to...

    Provided By NitroSecurity

  • Webcasts // May 2011

    Detecting Advanced Threats With New Risk Score Correlation and SIEM

    In this webcast, the presenters say sophisticated malware and determined insiders present dual challenges for IT security teams. Insiders understand internal policies and operate "Within the rules," while advanced malware's persistence and stealth can evade most detection technologies.

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Detecting Advanced Threats and Malware With SIEM

    In this webcast, the presenters say about many organizations have deployed Security Information and Event Management (SIEM) solution to meet regulatory compliance requirements, high performance SIEM solutions can do much more. By correlating events, logs, and network flows SIEMs can uncover a range of diverse "Low and slow" attacks.

    Provided By NitroSecurity

  • Webcasts // Mar 2011

    SC eConference: PCI Compliance That Makes Systems Secure

    In this webcast, the presenters say about the many demands noted in the PCI Data Security Standard is no small feat, as many information security pros well know. And while there are many who claim they're in line with these industry regulations, they find themselves still getting victimized by cybercriminals....

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Situational Awareness in Industrial Networks an Early Warning System for Energy, Chemical, Nuclear and Other Industrial Systems

    In this webcast, the presenters say about network behavior and security events can be measured and analyzed to indicate errors, anomalies and threats to their information infrastructure. Industrial processes can also be measured analyzed for availability, performance and quality.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Proactive Compliance for PCI-DSS 2.0

    In this webcast, the presenters say about current compliance methods are reactive and do little to improve security. In place of annual audits and document-heavy processes, a new, Proactive Compliance model makes compliance an element of normal information security operations.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Trusted Insider Threat - Lessons Learned From WikiLeaks

    In this webcast, the presenters say about protecting against and detecting potential data leakage is at the heart of the WikiLeaks controversy. However there is no "One size fits all" solution. It must be addressed at multiple levels with collaborating technologies, including SIEM, database monitoring and application monitoring, to provide...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Tool Talk Webcast: Detect Data Loss and Fraud With Application Monitoring and SIEM

    In this webcast, the presenters say about sensitive information is leaving organizations inside email attachments, file transfers, instant messages, and social media and web posts. Confidential data is being altered - whether by a disgruntled employee, or by an outsider using compromised user credentials. Current technologies, like DLP, can be...

    Provided By NitroSecurity

  • Webcasts // Nov 2010

    Why SIEM Should Be on Your 2011 Short List

    In this webcast, the presenters say about information security is in a rapid state of change. The threat landscape grows more pervasive and sophisticated each day with new attacks targeting applications, zero-day vulnerabilities, and even industrial control systems. At the same time, IT infrastructure is also in the midst of...

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Detecting Data Leakage and Cyber Threats to PHI With Security Information Management

    In this webcast, the presenters say about healthcare entities address increasing compliance requirements and implement electronic health record systems, the relentless risk of data leakage and cyber threats becomes even more challenging. Protected Health Information (PHI) is vulnerable to both insider actions and outsider threats.

    Provided By NitroSecurity

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Sep 2010

    Keys to Selecting SIEM & Log Management

    In this webcast, the presenters say about today's securing networks and meeting compliance requirements are dual challenges faced by every IT team. Bad things are happening much faster, as new exploits are discovered, 'Weaponized', and distributed to the world within hours.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Emergence of Content Aware SIEM

    In this webcast, the presenters say about content aware SIEM is a new generation of Security Information and Event Management (SIEM) solutions that now have visibility into network flows, database sessions and application layer data and can combat insider threats, data loss, fraud and advanced persistent threats.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Detecting Dangerous PDFs and Application Layer Threats

    In this webcast, the presenters say about malware making use of PDF files is one of many complex threats that are "Moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Automating Compliance and Security With SIEM at the Bank of China

    In this webcast, the presenters speak about increasing compliance requirements and relentless cyber threats and attacks, the Bank of China in New York needed to automate network security to make its IT staff more effective and efficient.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Making Log Data Actionable Through SIEM Integration

    In this webcast, the presenters say about log data collected to meet compliance requirements can be used to increase security as well. If effectively combined with event, activity and flow data, logs contribute to effective threat detection and incident response. A deeply integrated, high performance SIEM and log management solution...

    Provided By NitroSecurity

  • Webcasts // Apr 2010

    Automating Security & Compliance With SIEM at Dallas-Fort Worth Hospital Council

    In this webcast, the presenters say about relentless cyber-threats and increasing compliance requirements can overwhelm the existing processes used by hospital IT staffs. New Security Information and Event Management (SIEM) solutions automate threat detection, enable rapid incident response and simplify compliance reporting.

    Provided By NitroSecurity

  • Webcasts // Mar 2010

    State Privacy Laws, National Reach How to Avoid Becoming a Case Study for Non-Compliance

    In this webcast, the presenters say about more adoption of privacy laws to protect their residents' personal information, the scope of these laws is evolving in significant ways. No longer just data breach notification requirements, today's laws mandate that companies take preventative measures to secure sensitive data.

    Provided By NitroSecurity

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • Webcasts // Jan 2010

    Avoid Patch Tuesday Wipeout: Ride the Endpoint Patching Wave

    Patching clients effectively and reliably is becoming a non-stop process for most organizations, demanding a robust, dynamic and automated infrastructure to ensure delivery. In this webinar, experts Paul Henry from leading IT security vendor Lumension and Ken Ross from KACE and will demonstrate how a broad, reliable and easy-to-use implementation...

    Provided By KACE

  • Webcasts // Jan 2010

    KBOX Systems Deployment Appliance vs. Symantec Ghost: Choosing an Enterprise Solution

    Point-imaging solutions such as Symantec Ghost automate only parts of the systems deployment process. The manual work that needs to be performed as a result can negate any automation benefits. In this product comparison white paper, EMA details the many advantages of the KBOX Systems Deployment Appliance, which caters to...

    Provided By KACE

  • Webcasts // Nov 2009

    Live Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Live WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Web Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Jan 2009

    AirWave Webcast: Best Practices in WLAN Security

    The presenter of this webcast discusses the eight most common security threats facing a WLAN infrastructure today and how to deal with them, followed by an open Q&A with the audience. Ends with a brief demo showing how the AirWave Management Platform can mitigate pressing security issues.

    Provided By Aruba Networks

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium

  • Webcasts // Jan 2009

    How Dell IT Simplified Database Security for SOX, PCI, SAS 70

    The attendee of this webcast will learn how to simplify database security and compliance - without impacting performance or creating more work for the DBAs and security teams. The attendee will also learn how Dell's IT group replaced its homegrown scripts and native database auditing with Guardium's automated, cross-DBMS platform...

    Provided By Guardium