Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Manage Your Sybase Infrastructure With Sybase Control Center

    In this webcast, the presenter explains about Sybase Control Center (SCC) and how one can use SCC to manage, monitor, and troubleshoot one Sybase infrastructure. In this webcast, the presenter discusses the following topics: What products can be monitored with SCC ?, How to generate alerts and be notified of...

    Provided By Sybase

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Webcasts // Jan 2012

    netmap: A Novel Framework for Fast Packet I/O

    Many applications (routers, traffic monitors, firewalls, etc.) need to send and receive packets at line rate even on very fast links. In this webcast, the presenter presents netmap, a novel framework that enables commodity operating systems to handle the millions of packets per seconds traversing 1..10 Gbit/s links, without requiring...

    Provided By USENIX

  • Webcasts // Jan 2012

    Mikko Hypponen: Three Types of Online Attack

    In this Webcast, the presenter discusses about online attack. The presenter also explains about three types of online attack on the people privacy and data - and only two are considered crimes.

    Provided By TED Conferences

  • Webcasts // Jan 2012

    How to Choose an Internet Password

    In this Webcast the presenter describes about what is a "password" and how do one can choose that? The presenter also describes that password is that secret code word that one set up, it's an agreement between the user and their host, or email provider, service provider, that this is...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Improve Your VOIP Sound Quality

    In this Webcast the presenter describes about how to improve their VOIP sound quality. One can get a QoS device installed on their network. One of them is offered by D-link, it's called a DI101. And some firewalls or routers have it incorporated into their device as well so one...

    Provided By Videojug

  • Webcasts // Jan 2012

    Security for VoIP

    In this webcast, the presenter describes about security for VoIP. The presenter also explains about VoIP clipping, VoIP DoS attack, VoIP-related SPIT, caller ID spoofing, VoIP pharming and how viruses used to affect VoIP calls, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Protect a Wireless Connection

    If the user is concerned about hackers tapping into their wireless internet connection, and want to make it as secure as possible, in this Webcast the presenter describing about how to protect a wireless connection.

    Provided By Videojug

  • Webcasts // Jan 2012

    How To Make Your Wireless Network Secure

    In this Webcast, the presenter explains about how to make the wireless network as a secured one. While setting up their wireless network one also want to be concerned about security. It's a little bit more vulnerable than a wired network is but it doesn't have to be.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Tell if a Website Is Secure

    There are a number of ways that the user can tell whether a site that their working with is secure or not. One of the most common ways is a little icon on the bottom of their browser that's a padlock. In this Webcast, the presenter explains about website security.

    Provided By Videojug

  • Webcasts // Jan 2012

    Computer Security and Surfing

    In this Webcast, the presenter explains about computer security and surfing. Encryption is a process in which data is encoded so that it can be sent over lines, network lines, the Internet, and it is decoded on the end where it is received. That way, the information, if it's intercepted...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Enhance the Privacy of Your E-mail On Your Computer

    E-mail is relatively private. Relatively private because it does involve machines and servers that handle multiple pieces of mail and are administered by other people. In this Webcast, the presenter explains about how to enhance the privacy of their E-mail on their Computer.

    Provided By Videojug

  • Webcasts // Jan 2012

    Safe Surfing: Narcissist Invades Your Computer

    In this webcast, the presenter discusses about the suspicious behavior in the internet such as persistent pop-ups; the computer or connection slow down considerably; repeated re-boots; mouse or keyboard freeze; strange messages and alerts. The presenter also discusses the Safe Surfing method to protect the computer from malware.

    Provided By Internet Archive

  • Webcasts // Jan 2012

    IT Trends to Watch in 2012

    In this webcast, the presenters discuss about IT trends for 2012. The presenters also discuss under the topics of consumerization of IT, where security threats will come from, the rise of big data and the cloud, and the IT economy.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    Google On Stupid vs. Money, SSL Search Firefox & HTML5 SEO

    In this webcast, the presenter explains about Google tools. Firefox is testing defaulting users to SSL Google which can be bad for marketers. Google made a change for some browsers that might label Google search traffic as direct referrer.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    VMware VNetwork Distributed Switch and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    Cisco Nexus 1000V and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch. This is a good introduction to some of the new features with vSphere 4.0 virtual networking.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    VMware Distributed Power Management and VSphere

    This webcast introduces the VMware Distributed Power Management (DPM) and how it can be leveraged to save power and money in the data center. The VMware Engineer discusses how it can be leveraged to improve the efficiencies in the data center and leverage it for power and cost savings. about...

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    Microsoft & Viewfinity Present: Windows 7 Migration is the Opportunity to Lockdown Desktops & Manage Standard User Privileges

    In this webcast, Microsoft and Viewfinity discuss endpoint security within the context of Windows 7 migrations with a specific emphasis on the protection provided by removing administrator rights. Alex Shteynberg, Technology Architect in the New York City Microsoft Technology Center discusses reasons why the desktop refresh fits perfectly into a...

    Provided By Viewfinity

  • Webcasts // Dec 2011

    Faculty Forum Online: Homeland Security

    National security in an age of massive movements of people across borders is a universal concern that involves complex issues. While borders have different characteristics and challenges, there are areas of commonality. Fortunately, the overwhelming majority of crossings are not problematic, but the ones that are raise concerns.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2011

    Screencast: Private Cloud Storage Optimization (related to Optimizing Storage)

    Learn how optimizations in Oracle Database 11g and Oracle Exadata Efficiently manage more data, maximize performance and provide protection against data loss. Reduce storage costs by a factor of 10x.

    Provided By Oracle

  • Webcasts // Nov 2011

    Google I/O 2010 - The Open & Social Web

    In this webcast, the presenter will cover the latest and most important trends of the Social Web and dive deep into where this is all going, at both technical and conceptual levels. From the concepts of digital identity, relationships, and social objects. The presenter will also cover emerging technologies like...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Where Is the Social Web Going Next?

    With the advent of social protocols like OAuth, OpenID and ActivityStrea.ms, it's clear that the web has gone social and is becoming more open. In this webcast, the presenter will discuss the importance of such emerging technologies, how they've adopted them in their products and debate what's next.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - OpenID-Based SSO & OAuth for Google Apps

    In this webcast, the presenter will discuss about the auth tangles that the user have encountered so far - OpenID, SSO, 2-Legged OAuth, 3-Legged OAuth, and Hybrid OAuth. The presenter will show the user when and where to use the APIs, code some example apps, and demonstrate how they all...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - What's the Hubbub About Google Buzz APIs?

    Google Buzz is a new way to share updates, photos, videos and more, and start conversations about the things the user find interesting. In this webcast, the presenters will take a deep dive into building with the Buzz APIs and the open standards it uses, such as ActivityStrea.ms, PubSubHubbub, OAuth,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Fluid Social Experiences Across Sites

    As more sites add social functionality, profiles, friends, and conversations are becoming increasingly fragmented. But an emerging collection of open technologies aim to help bridge these social islands, allowing users to seamlessly move between sites and have unified conversations that span multiple web sites. In this webcast, learn how OpenID,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Exploring the Google PowerMeter API

    In this webcast, the presenters will discuss interesting ways to make users understand and manage their home energy use through Google PowerMeter. The Google PowerMeter API currently available allows devices to integrate with Google PowerMeter.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Google Storage for Developers

    In this webcast, the presenter explains about Google's expanding storage products by introducing Google Storage for Developers. The presenter also describes the advantage of the performance and reliability of Google's storage infrastructure, as well as the advanced security and sharing capabilities.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Google I/O 2008 - OpenSocial, OpenID, and OAuth: Oh, My!

    A number of emerging technologies will soon collectively enable an open social web in which users control their information and it can flow between multiple sites and services. OpenID, OAuth, microformats, OpenSocial, the Social Graph API, friends-list portability, and more will be discussed, as well as a coherent vision for...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Google I/O 2008 - Authenticating to Google Data Services

    Get over that first hurdle in the users prototype! Authenticating a user is a tricky, but necessary step for most applications that interact with Google services. In this webcast, the presenter will discuss the available authentication options, their limitations, and some advanced use cases such as Google Apps domains and...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Google I/O 2009 - The Social Web: An Implementor's Guide

    The web is going social and the social web is going open - come and learn the latest ways to build their website into this social ecosystem. Reduce sign-up friction with OpenID and OAuth hybrid on-boarding. Use Portable Contacts to tap their users' social graph without scraping. Let them promote...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity