Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Nov 2012

    Get the Most Out of Your B2B Community: IBM B2B Cloud Services

    In today's increasingly competitive global business environment, more and more organizations are seeing the value and use of B2B services--moving beyond basic connectivity and into more sophisticated integration with the cloud. But the growing number of partners and complexity of connections and platforms make it hard to find a solution...

    Provided By IBM

  • Webcasts // Jun 2008

    PowerPath Encryption With RSA

    Attendee of this webcast will learn about the new PowerPath Encryption with RSA that leverages the RSA Key Manager for the DataCenter for centralized, policy-based enterprise-wide key management. This unique offering enables to protect sensitive information against a security breach while also providing compliance with internal, private and government standards.

    Provided By EMC

  • Webcasts // Apr 2009

    Chat With EMC Executives: Introducing EMC SourceOne Information Governance Solutions

    Information is universally recognized as the key business asset, essential to business success. But ungoverned information can also be costly and put organizations at risk. The presenter of this webcast explain how EMC is changing the playing field from point products to a more comprehensive and integrated approach to information...

    Provided By EMC

  • Webcasts // Apr 2009

    Innovation Network Lecture Series: EPC RFID Tags in Security Applications: Passport Cards, Drivers Licenses, and Beyond

    Electronic Product Code (EPC) tags are industry-standard Radio Frequency Identification (RFID) devices poised to supplant optical barcodes in many applications. They are prevalent in case and pallet tracking, and percolating into consumer items and border-crossing documents. The attendee of this webcast will explore the systemic risks and challenges created by...

    Provided By EMC

  • Webcasts // Aug 2009

    Reduce Backup Costs by Easily Implementing Data Deduplication in Your NetWorker Environment

    Excessive data growth is leading to skyrocketing storage costs for backup. The thought of adopting data deduplication can seem overwhelming - especially with a tight budget. The attendee of this webcast will find out more about EMC deduplication. The attendee will learn about the benefits of source-based and target-based deduplication....

    Provided By EMC

  • Webcasts // Aug 2009

    Simplify Backup Operations to Improve Your Total Cost of Ownership

    The attendee of this webcast will discover technologies that can optimize the data protection environment. This webcast will show how EMC Data Protection Advisor enables backup reporting, alerting, monitoring, and analysis by collecting a broad set of data and transforming it into actionable information. The attendee will see how an...

    Provided By EMC

  • Webcasts // Feb 2010

    EMC Webcast: Cut Data Protection Costs with Deduplication

    Virtualized environments are challenging traditional data protection infrastructures and processes. With EMC Avamar and Data Domain backup-to-disk with data deduplication and automated centralized management, you can meet data protection requirements for virtualized environments and reduce costs in your backup infrastructure.

    Provided By EMC

  • Webcasts // Mar 2009

    Drive Greater Backup Efficiency With EMC Disk Library and EMC Data Protection Advisor

    Reduce the data footprint and associated costs while storing more data - in less time, more often, for longer periods - and provide faster access to that data. EMC's disk-based backup and archive solutions, with deduplication and unified management, eliminate the inherent inefficiencies in traditional backup. The presenter of this...

    Provided By EMC

  • Webcasts // Mar 2009

    Lower Costs and Risk With Unified Backup Management, Monitoring, and Reporting

    Reduce the data footprint and associated costs while storing more data - in less time, more often, for longer periods - and provide faster access to that data. EMC's disk-based backup and archive solutions, with deduplication and unified management, eliminate the inherent inefficiencies in traditional backup. The presenter of this...

    Provided By EMC

  • Webcasts // Mar 2009

    Navigating the Perfect Storm in VMware Backup

    Reduce the data footprint and associated costs while storing more data - in less time, more often, for longer periods - and provide faster access to that data. EMC's disk-based backup and archive solutions, with deduplication and unified management, eliminate the inherent inefficiencies in traditional backup. The presenter of this...

    Provided By EMC

  • Webcasts // Mar 2009

    How to Stretch Your Retail IT Budget With EMC Avamar Backup and Recovery for VMware

    In the current global economy, there is more pressure than ever to control IT costs while protecting a continually growing volume of data. Organizations are struggling to effectively manage backup and recovery with limited budgets, especially in virtualized environments. The presenter of this webcast discovers the overarching benefits of backup...

    Provided By EMC

  • Webcasts // Mar 2009

    Drive Down Costs and Increase Efficiencies in Backup and Recovery for VMware Environments

    In the current global economy, there is more pressure than ever to control IT costs while protecting a continually growing volume of data. Organizations are struggling to effectively manage backup and recovery with limited budgets, especially in virtualized environments. The presenter of this webcast discovers the overarching benefits of backup...

    Provided By EMC

  • Webcasts // Mar 2009

    Build an Efficient and Cost-Effective IT Security and Compliance Program

    In many organizations, security and compliance activities are often piece-meal and disparate - technologies, policies, and procedures are put into place within the confines of a single regulatory or security domain. The result is a costly and inefficient process. The attendee of this webcast will learn how to dramatically cut...

    Provided By EMC

  • Webcasts // Mar 2009

    Run Your Data Center More Efficiently: Part 2: Automate Your Data Center to Ensure IT Efficiency for Change, Configuration and Compliance!

    Today, with the added pressure to take costs out of the data center and enforce ever-more demanding compliance requirements - how to maintain compliance and ensure adherence to internal/external policies and governance rules? The attendee of this webcast will get an insight on how EMC can help to overcome challenges.

    Provided By EMC

  • Webcasts // Mar 2009

    Automate PCI Compliance in Your Data Center$

    Many organizations that store, process, or transmit credit card data are struggling to comply with the PCI Standard, which requires them to carefully manage and secure their cardholder data while addressing 230+ diverse requirements. EMC PCI technology solutions and professional services help businesses understand their PCI DSS compliance status, prepare...

    Provided By EMC

  • Webcasts // Mar 2009

    Deploying IP-based Replication Based on Service Levels With EMC Celerra Replicator $

    With EMC Celerra Replicator, the organization can directly specify recovery service levels to provide efficient, snapshot-based, asynchronous data replication over IP networks - all at an affordable price. The attendee of this webcast will learn how to implement simple and affordable disaster recovery. The attendee will find out how Celerra...

    Provided By EMC

  • Webcasts // Mar 2009

    New Levels of Efficiency in Data Protection for Oracle Environments $

    EMC RecoverPoint is the best option for local and remote replication for midsize enterprises running Oracle databases and applications. In addition to reducing bandwidth costs, RecoverPoint enables near instantaneous restores of multiple applications and databases within the same consistency group, up to the point of failure. The attendee will learn...

    Provided By EMC

  • Webcasts // May 2009

    Innovation Network Lecture Series: Authentic Time-Stamping for Archival Storage

    The authenticity of archived electronic records is established manually by ad hoc methods, such as checking software and examining audit logs. A more cost-effective and scalable mechanism is proposed to establish the integrity and creation time of electronic documents. This solution protects against a powerful inside attacker who has incentives...

    Provided By EMC

  • Webcasts // May 2009

    What You Don't Manage Can Hurt You: An IDC Perspective on Information Governance

    The attendee of this webcast will find out how to do more with EMC SourceOne products, a family of next-generation information governance solutions. Based on a scalable, flexible, and innovative architecture, EMC SourceOne solutions enable policy-driven information management to address critical archiving, eDiscovery, and compliance requirements. The presenter discusses information...

    Provided By EMC

  • Webcasts // Mar 2009

    Managing EMC RecoverPoint Data Protection in vMware Environments

    Disaster recovery is the top priority in VMware infrastructure deployments. Organizations need a comprehensive solution that offers Continuous Data Protection (CDP) and remote replication. EMC RecoverPoint protects valuable data in heterogeneous VMware environments - with efficient and effective recovery to any point in time. With integrated VMware Site Recovery Manager...

    Provided By EMC

  • Webcasts // Oct 2008

    Good Governance - Security and Information Rights Management - Part 8

    Document security is more than just a best practice - increasingly, it's the law. How will the organization comply with government regulations for securing customer and personal information while still maintaining the critical ability to collaborate and share information? Information Rights Management (IRM) enables organizations to tightly control who can...

    Provided By EMC

  • Webcasts // Oct 2008

    The Importance of Archiving to Manage Exponential Data Growth

    Most organizations are struggling with the impact of information growth on their infrastructures and information protection processes. More information means organizations must retain more, manage more, and protect more. With the broadest portfolio of archiving offerings in the industry, EMC enables organizations to implement solutions with the advanced capabilities necessary...

    Provided By EMC

  • Webcasts // Sep 2008

    EMC Replication Solutions for CLARiiON

    The attendee of this webcast will learn about how EMC local data protection and remote replication can secure the business-critical applications and data in the CLARiiON CX3/CX4 environments. The presenters gives demonstration of how RecoverPoint/SE provides a single product solution for protecting and replicating Microsoft Exchange data in many local...

    Provided By EMC

  • Webcasts // Aug 2008

    Realizing Your Oracle Investment With EMC

    EMC systems, software, and services enable businesses of all sizes to maximize the use of their Oracle software features. New energy-efficient, cost-effective hardware and software solutions enhance the Oracle systems, while EMC Proven Solutions for Oracle help to realize the Oracle investment more quickly. The attendee of this webcast will...

    Provided By EMC

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • Webcasts // Mar 2009

    Technical Webinar: Optimizing Security With HASP SRM API

    The presenter discusses how HASP SRM delivers the API infrastructure needed to integrate license creation, product activation, and fulfillment information into the existing back-office systems. Providing greater visibility into business information is just one way HASP SRM improves the organization's sales processes and reduces operational costs. The attendee will learn...

    Provided By Aladdin Knowledge Systems

  • Webcasts // Mar 2010

    Presentations that Drive Action with Evidence

    Discover expert guidelines for designing evidence-based presentations that will educate your audience and drive them to action.

    Provided By Adobe Systems

  • Webcasts // Nov 2009

    You Had Me at Hello: Techniques to quickly catch people's attention in marketing webinars

    View this recorded webinar to learn how to create better beginnings for your presentations or marketing materials so that you attract attention in 30 seconds or less.

    Provided By Adobe Systems

  • Webcasts // Jan 2010

    Chalkboard to Keyboard: Creating Collaborative Learning Experiences Online

    Cynthia Clay shows how to repurpose traditional classroom activities like lectures, peer-to-peer discussions, role playing, and other activity-based learning methods for web delivery.

    Provided By Adobe Systems

  • Webcasts // Jul 2009

    Improving Your Online Presentation Skills

    Not sure if you're engaging enough online? You can become a more engaging and persuasive spokesperson for your organization while feeling comfortable and in control during your online seminars.

    Provided By Adobe Systems

  • Webcasts // Jul 2009

    Do More for Less with Web Conferencing

    Today's marketplace has created the perfect opportunity to re-think the way technologies can improve business processes and efficiency. One of those technologies is web conferencing and the opportunities are astounding.

    Provided By Adobe Systems

  • Webcasts // Sep 2009

    Discover the Difference: Adobe® Connect™ vs WebEx

    Watch this 30 minute session to discover the difference between Adobe Connect for online meetings and training compared to Cisco's WebEx.

    Provided By Adobe Systems

  • Webcasts // Aug 2009

    7 Engaging Tactics and 7 Essentials Tools for Virtual Classrooms

    In this recorded webinar, learn how to utilize virtual classrooms to deliver online training that is better than in-person training. Discover seven easy and interactive tactics you can implement now in your virtual classroom to train your staff more effectively.

    Provided By Adobe Systems

  • Webcasts // Dec 2009

    Secure Web Conferencing with Alistair Lee by Adobe

    Watch this 15 minute session with Adobe's Alistair Lee to learn how Adobe? Connect? uniquely enables organizations to gain all of the benefits of Web conferencing while meeting necessary security and compliance requirements.

    Provided By Adobe Systems

  • Webcasts // Oct 2009

    Securing Architectures and Applications for Network Convergence

    Manufacturers today can make smart decision at the same time make better business because the manufacturers are able to access to manufacturing data through the advanced convergence of both manufacturing, and enterprise networks which has offered them. This has provided the manufacturers, the competitive edge than the rest. What ever...

    Provided By Cisco Systems

  • Webcasts // Mar 2010

    Virtualize Mainframe Backup to Ensure Business Resiliency

    Mainframe data protection is NOT the same as it's always been - new technologies make it easier than ever to back up the data. By leveraging EMC Symmetrix storage, TimeFinder replication, Data Domain deduplication, and INNOVATION Data Processing business resiliency solutions, one can protect the data and still, meet the...

    Provided By EMC

  • Webcasts // Mar 2010

    Securing VMware Desktop and Server Environments With RSA

    The attendee will learn more about security considerations in a virtual IT environment, and get a detailed look at specific RSA solutions that help mitigate risk and meet compliance requirements. This webcast webcast will help to understand how to identify the security risk in a virtual IT environment.

    Provided By EMC

  • Webcasts // Apr 2010

    Monitoring Administrator Activity in a Virtual World

    Adding capabilities for monitoring and reporting - as well as authorizing administrator access - is critical to the security of the virtual environment. The attendee will find out how a SIEM (Security Information and Event Management) and log management solution can make monitoring and auditing administrator activity in a virtualized...

    Provided By EMC

  • Webcasts // Jun 2010

    Managing Deduplicated Backup With EMC Data Protection Advisor

    To stay on top of the ever-evolving data protection environment, one needs realtime monitoring and reporting. With EMC Data Protection Advisor, one can collect and analyze information from the entire data protection infrastructure - physical/virtual, backup, replication, and deduplication - to help one make quick, informed decisions, solve problems faster,...

    Provided By EMC

  • Webcasts // Jul 2010

    Why ISIS? - Understanding the Value

    ISIS (Image and Scanner Interface Specification) is an industry standard that enables one to easily integrate document imaging into the solution offerings. This on-demand webcast gives an introduction to ISIS. Learn how ISIS can help a person quickly develop imaging applications and bring them to market - giving them a...

    Provided By EMC