Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2009

    Come See What's New in PingFederate 5.2!

    Over the years, Ping Identity has strived to reduce secure Internet SSO connection times. With the number of relationships growing between organizations, their service providers, SaaS vendors, partners, affiliates and acquisitions, identity federation plays an increasingly critical role in simplifying the identity and information sharing dilemma. The attendee of this...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    How to Sell SSO to Your Customers

    On a daily basis, many of the service provider customers ask for help in selling Internet SSO to their customers. They know it provides ease of access and improves security, but communicating this to their customers can be a challenge. Ping Identity has developed a kit that allows the organization...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Single Sign-On and Provisioning Options for Salesforce CRM

    Salesforce CRM users now have a way to securely access the tool without a user name and password. Ping Identity automates Salesforce CRM user provisioning while at the same time providing single sign-on for all of the ways users access it. These solutions deploy rapidly and they work with the...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Successful Internet SSO Strategies for Fast, Effective SaaS Integration

    With SaaS (Software as a Service) achieving widespread market penetration, organizations have shifted from determining why they should adopt cloud computing services to how to adopt them effectively. The presenter of this webcast explores how standards-based Internet Single Sign-On helps speed integration and derives even greater value from SaaS applications.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Internet SSO, Compliance and Google Enterprise

    As the momentum behind Google Enterprise adoption continues to build, companies large and small are starting to develop best practices for addressing single sign-on and provisioning requirements for Google Enterprise applications. Ping Identity has emerged as the leading Internet SSO solution provider for Google Enterprise customers. The presenter of this...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    PingFederate 6.0

    IT faces a number of challenges supporting the business today. Economic pressure to save money and do more with less is driving even more applications outside of the firewall and into the Cloud. Users demand Internet Single Sign-On, applications need to securely share user identity and IT needs to manage...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Drop Internet SSO Connection Time From Hours to Minutes

    Searching for a way to establish many Internet Single Sign-On (SSO) connections with virtually no maintenance or deployment overhead while overcoming partner objections due to misperceptions that identity federation is difficult, expensive and time consuming? The attendee of this webcast will discover what's new with Ping Identity's flagship Internet Identity...

    Provided By Ping Identity

  • Webcasts // Jan 2010

    Avoid Patch Tuesday Wipeout: Ride the Endpoint Patching Wave

    Patching clients effectively and reliably is becoming a non-stop process for most organizations, demanding a robust, dynamic and automated infrastructure to ensure delivery. In this webinar, experts Paul Henry from leading IT security vendor Lumension and Ken Ross from KACE and will demonstrate how a broad, reliable and easy-to-use implementation...

    Provided By KACE

  • Webcasts // Jan 2010

    KBOX Systems Deployment Appliance vs. Symantec Ghost: Choosing an Enterprise Solution

    Point-imaging solutions such as Symantec Ghost automate only parts of the systems deployment process. The manual work that needs to be performed as a result can negate any automation benefits. In this product comparison white paper, EMA details the many advantages of the KBOX Systems Deployment Appliance, which caters to...

    Provided By KACE

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Provided By Veeam Software

  • Webcasts // Mar 2014

    On-demand Webcast: How to Protect and Recover SharePoint Data

    Microsoft SharePoint is an amazingly popular solution for sharing and centralizing control over important business data. Join us as we talk about the value of virtualizing your SharePoint infrastructure and the benefits of using Veeam® Backup & Replication™ to protect the valuable data that resides in your SharePoint databases. ...

    Provided By Veeam Software

  • Webcasts // Nov 2009

    Live Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Live WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Web Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Apr 2009

    Take Control of Dynamic SQL for DB2 on z/OS

    SQL is one of the popular products in the industry, and dynamic SQL is increasing with the increasing use by the clients. The static SQL which was used traditionally to manage database, and the ability which the dynamic SQL can manage cannot be ignored. The dynamic SQL also offers the...

    Provided By Neon

  • Webcasts // Feb 2009

    How Do You Know if Your DB2 Backup and Recovery Plan Will Work When You Need It?

    Does one's organization have any specific DB2 recovery strategy that has the capability to support the various risks, the cost, and the service which is involved in your business? Can one approximately tell the IT department, and the business management how long the application would be down when an unplanned...

    Provided By Neon

  • Webcasts // Jan 2009

    On-Demand Webcast: Getting the NAC of LAN Security

    The presenter of this webcast discusses the strengths and weaknesses of NAC and outlines requirements for a complete LAN security strategy.

    Provided By Nevis Networks

  • Webcasts // Jan 2009

    Persistent LAN Security Presentation

    What is LAN Security? How to protect the internal network from a full range of threats? This webcast throws light on these topics.

    Provided By Nevis Networks

  • Webcasts // Jan 2009

    Is Your Network Safe for 3rd Party Access?

    This webcast will focus on the business trend towards allowing 3rd parties (non-employees) access to corporate networks. It explores the security challenges that "Open" network access creates for IT and introduces a comprehensive solution. A real customer example from within the financial services industry will be highlighted, and a discussion...

    Provided By Nevis Networks

  • Webcasts // Sep 2011

    Best Practices to Optimize Performance in eCommerce Production Environments

    In this webinar with retailer The Bon-Ton Stores, learn how they've successfully overcome issues in operating a complex Websphere production e-commerce site to ensure optimal Web application performance and user experience. Dan Gerard, Divisional Vice President of Technical and Web Services at The Bon-Ton Stores, joins to discuss: Overcoming...

    Provided By dynaTrace software

  • Webcasts // Jan 2009

    Safe Email Practices

    Today's email environment lives in a threat environment that is higher than it has ever been. Some say that email itself is on the verge of extinction because of the perils associated with it. Others find it absolutely essential to conducting business in a networked world. This webcast presents a...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Enterprise Information Protection - Best Practices and Policies for Internet Security

    Trends show that the major obstacle to sound information security is not technical, but cultural. Yet most of the IT world continues to endorse a technology-centric approach to information protection. Many companies forget that security technologies are only as reliable and resilient as the underlying infrastructures they are trying to...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Decrypting Encryption - A Look at Data Encryption and Security Options

    Data security involves taking action and addressing multiple technology domains, including networks, servers, applications and storage. The importance of data security is not limited to large, high profile enterprise environments; rather, data security and awareness are needed across all environments.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Identifying Internal Security Threats

    Security threats are not limited to external attacks - threats from within can cause as much, if not more damage to a company's assets and reputation. Without a solid understanding of internal threats, an organization can be left unprepared to deal with the consequences of an attack from a trusted...

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    How Hackers Exploit Application Weaknesses

    Attend this webcast to learn how hackers exploit application weaknesses.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Tracking the Hackers

    Knowing when the internal network has been compromised and determining the severity of the damage is vitally important to the organization. Hackers can take over a machine and use it for their own purposes.

    Provided By WebMediaBrands

  • Webcasts // Jan 2009

    Mail Security: Protecting Your Email From Spam and Viruses

    In the first 6 months of 2005, small businesses were the 2nd most targeted industry in terms of attacks. Spam and viruses coming through the email can result in data loss as well as lost employee productivity, potential legal liability, and an increased burden on resources and budget.

    Provided By WebMediaBrands

  • Webcasts // Jan 2011

    A Week in the Life of a Web Hosting Operations Manager

    In this webcast, the presenters say about the Open source anti-spam and anti-virus software are popular with web hosting operators as they offer low cost solutions. But do they really save money? Check out a week in the life of Dave, a web hosting operations manager, and the issues he...

    Provided By Commtouch Software

  • Webcasts // Apr 2009

    Live Event: PCI DSS Compliance In Action: Regis Corporation

    Are you charged with the daunting task of managing your company's PCI DSS (Payment Card Industry Data Security Standard) compliance? If so, don't miss this live TechRepublic Webcast with real-world stories from industry leaders. Hosted by James Hilliard for TechRepublic and featuring guest speakers Steve Dispensa, Data Security Expert,...

    Provided By PhoneFactor

  • Webcasts // Jan 2009

    Security and Compliance: A Hosting Provider's Perspective

    Whether using or evaluating managed hosting providers, or choose to keep the application hosting in-house, the simple act of reviewing the security considerations shared in this webcast, will help to address the security concerns, keep the business safe, maximize ROI and avoid costly security incidents.

    Provided By Computer Sciences Corporation

  • Webcasts // Jun 2009

    The Wrong Way To Do Brand Marketing

    This webcast is guiding about what not to do while doing brand marketing. What's in this video: - Telemarketing, spam, junk mail, scams will hurt your business in the long run. Things you must do to market yourself for the long run.

    Provided By Howcast

  • Webcasts // Aug 2009

    At Networking Events, Act Like A Host, Not A Guest

    This webcast is discusses about people who are uncomfortable while introducing themselves to new contacts at business networking events. Take Ivan Misner?s approach and act like the host.

    Provided By Howcast

  • Webcasts // Nov 2008

    International Options For US Affiliates

    The international affiliate marketing is growing with absolutely no hindrance, but unless watched and executed carefully, it is likely falter and fall on its nose. There are several challenges that affiliate marketers face when they start out with their campaign. The first challenge that most affiliate marketers especially affiliates in...

    Provided By Howcast

  • Webcasts // Jul 2009

    Looking For Corporate Logo Design Services Watch Out For These 3 Traps

    After running through the usual procedures of beginning a business, this webcast addresses the matter of corporate logo design.

    Provided By Howcast

  • Webcasts // Oct 2012

    Spear Phishing: Avoid Becoming a Trophy Phish

    Unique phishing attacks surge worldwide according to the Anti-Phishing Working Group. Advanced targeted attacks, like spear phishing, are fast becoming the norm. Spear phishing has especially become a successful tactic that hackers use to exploit networks and trigger an attack that can lead to catastrophic financial, operational, and reputation risks....

    Provided By FireEye

  • Webcasts // Jan 2010

    Web Browser Protection Against Web Malware

    This webinar is a discussion about the various socially engineered and created malware which is mainly intends to spoil systems. The webinar also gives the insight on how they tested the various browsers which are available almost all the six browsers. Based on the recent study, over 50% of malware...

    Provided By NSS Labs

  • Webcasts // Jan 2010

    10 Gbps Intrusion Prevention

    This informative webinar will provide a checklist of criteria to look for when evaluating products, and will include an under the hood look at high-speed deep packet inspection testing along with real experiences culled from our extensive 10 Gbps IPS Comparative Test. This webcast helps you in Finding out why...

    Provided By NSS Labs

  • Webcasts // Aug 2009

    Healthcare Data Security Update: Latest Changes and What Technologies You Need to Comply

    With the recent passage of the HITECH Stimulus package, Congress has created much talk and activity with regards to electronic medical records. But there are measures in the act that have nothing to do with money for EMRs that will affect all healthcare providers. With enactment of the American Recovery...

    Provided By Vendome Group