Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security and Anonymity Vulnerabilities in Tor

    There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Further, the academic research community has been coming up with increasingly esoteric and increasingly effective, attacks against all anonymity designs, including Tor.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Novell Cloud Security Service

    In this webcast, the presenter going to show the users' how they can harness the technology of the future with Novell Cloud Security Service. The presenter also going to explain about how service providers can manage multi-tenant SaaS infrastructures.

    Provided By Novell

  • Webcasts // Jan 2014

    Identity and Security Services Video

    In this webcast, the presenter gives an overview of Novell services for identity and security. The presenter also explains about different identity strategy, web access management, security audit, identity management deployment and password management.

    Provided By Novell

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Provided By Workday

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Oct 2013

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Oct 2013

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Sep 2013

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware

  • Webcasts // Sep 2013

    Moving to Microsoft Exchange 2013?

    Are you ready to make the move to Exchange 2013 and enjoy its new, powerful features? In this archived webcast, see if your company is ready for this important migration and the steps to take for it to be a success. Watch it today.

    Provided By Dell Software

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel

  • Webcasts // Sep 2013

    Video: Editors' Q&A on Infrastructure as a Service

    Cloud computing encompasses a lot of different technologies but the two biggest categories are Software as a Service (apps) and Infrastructure as a Service (servers). The IaaS providers make a very convincing argument for businesses to stop running their own data centers and simply purchase server capacity on-demand and scale...

    Provided By ZDNet

  • Webcasts // Sep 2013

    Video: Editors' Q&A on Infrastructure as a Service (UK)

    Cloud computing encompasses a lot of different technologies but the two biggest categories are Software as a Service (apps) and Infrastructure as a Service (servers). The IaaS providers make a very convincing argument for businesses to stop running their own data centers and simply purchase server capacity on-demand and scale...

    Provided By ZDNet

  • Webcasts // Jun 2010

    TechNet Webcast: Using a Microsoft Information Protection Solution With RSA Data Loss Prevention (Level 300)

    Learn best practices from the field on how Microsoft information protection solutions provide data protection for information that is in use, in motion, and at rest. This webcast explains how to use Active Directory Rights Management Services (AD RMS) in conjunction with RSA Data Loss Prevention to automate information protection...

    Provided By Microsoft

  • Webcasts // Jul 2010

    TechNet Webcast: Using the Microsoft Security Intelligence Report V8 in an Evolving Threat Landscape (Level 200)

    The presenter of this webcast discusses the Microsoft Security Intelligence Report (SIRv8) observed in the second half of 2009. In this webcast, the presenter provides a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input...

    Provided By Microsoft

  • Webcasts // Jul 2010

    Automate, integrate and connect work processes with smart work.

    Companies are rethinking the way people work and discovering new resources for collaboration, mobility and flexibility in the process. This short, entertaining video explores the advantages of smarter, more dynamic processes. Find out how to embrace creative new processes to connect people and resources for faster, more efficient ways of...

    Provided By IBM

  • Webcasts // Jun 2010

    TechNet Webcast: Forefront Endpoint Protection 2010 and System Center Configuration Manager (Level 200)

    The disciplines of system management and security can be considered two sides of the same IT coin when it comes to endpoints. System management ensures that systems are configured, patched, and operating correctly, and security keeps threats and vulnerabilities from compromising the system. The upcoming release of Microsoft Forefront Endpoint...

    Provided By Microsoft

  • Webcasts // Jun 2010

    TechNet Webcast: How to Protect Windows Clients With System Center Data Protection Manager 2010 (Level 200)

    One of the most exciting new features in Microsoft System Center Data Protection Manager (DPM) 2010 is protection for client workstations running Windows operating systems, including laptops that are often disconnected from the corporate network. The presenter of this webcast looks at how DPM 2010 creates policies for what kinds...

    Provided By Microsoft

  • Webcasts // Jun 2010

    TechNet Webcast: Best Practices on Deploying Microsoft's Secure Collaboration Solution (Level 300)

    Come hear from an expert partner about real-world deep dive scenarios and best practices for deploying Microsoft's Secure Collaboration Solution, including Active Directory Rights Management Services, Forefront Protection 2010 for SharePoint, Active Directory Federation Services, and Forefront Unified Access Gateway 2010. Also learn how they enable more secure business collaboration...

    Provided By Microsoft

  • Webcasts // Jun 2010

    TechNet Simulcast: Forefront Virtual Event (Day 2)

    One may have already heard about the Secure Messaging, Secure Endpoint, Secure Collaboration, Identity and Access Management, and Information Protection solutions which are a part of Microsoft Forefront's Business Ready Security. Now, one can dive deep into the new Forefront products which are a part of those solutions. Hear from...

    Provided By Microsoft

  • Webcasts // Jun 2010

    TechNet Simulcast: Forefront Virtual Event (Day 1)

    One may have already heard about the Secure Messaging, Secure Endpoint, Secure Collaboration, Identity and Access Management, and Information Protection solutions which are a part of Microsoft Forefront's Business Ready Security. Now, one can dive deep into the new Forefront products which are a part of those solutions. Hear from...

    Provided By Microsoft

  • Webcasts // Jul 2010

    TechNet Webcast: Deploying a Microsoft Identity and Access Management Solution (Level 300)

    The attendee of this webcast learns about real-world scenarios and best practices for deploying a Microsoft identity and access management solution, using Microsoft Forefront Identity Manager 2010, Microsoft Forefront Unified Access Gateway 2010, and Active Directory Federation Services. Discover how these technologies helps the presenter provide the users with more...

    Provided By Microsoft

  • Webcasts // Jul 2010

    MSDN Webcast: Security Talk: Using Windows Azure Storage Securely (Level 200)

    Microsoft built Windows Azure Storage with security being one of the primary objectives. The presenter of this webcast covers how to store and access data securely; explains how to share blobs with other users using container Access Control Lists (ACLs) and the SAS feature; and the presenter discusses some of...

    Provided By Microsoft

  • Webcasts // Aug 2009

    At Networking Events, Act Like A Host, Not A Guest

    This webcast is discusses about people who are uncomfortable while introducing themselves to new contacts at business networking events. Take Ivan Misner?s approach and act like the host.

    Provided By Howcast

  • Webcasts // Jan 2010

    Conquering the Minefield of Soft Rogue APs in Enterprise Networks

    A soft Access Point (AP)is a device such as a laptop or other wireless enabled device which performs traffic forwarding between its wireless interface and some other interface which is in turn connected to a secure network. The major advantage of using the soft AP is that this can show...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    IT Security: Achieving Operational Maturity

    This webcast discusses the unique challenges of ensuring the security of IT data, systems and transactions with Lawson Software. Learn how to cost-effectively transform security programs and processes into proactive and operationally mature systems that address problems at their root causes. Understanding of key components of an effective security program,...

    Provided By CIBER

  • Webcasts // Jan 2010

    Moving Beyond the Disaster Readiness Plateau: The Mandate for Integrating Government Capabilities

    Does one want to know about Disaster Readiness Plateau: The Mandate for Integrating Government Capabilities? One should see the web cast for more details and it provides clear information and basics of Disaster Readiness Plateau: The Mandate for Integrating Government Capabilities. This is a free, one-hour web cast presented by...

    Provided By CIBER

  • Webcasts // Jan 2010

    Web Browser Protection Against Web Malware

    This webinar is a discussion about the various socially engineered and created malware which is mainly intends to spoil systems. The webinar also gives the insight on how they tested the various browsers which are available almost all the six browsers. Based on the recent study, over 50% of malware...

    Provided By NSS Labs

  • Webcasts // Jan 2010

    10 Gbps Intrusion Prevention

    This informative webinar will provide a checklist of criteria to look for when evaluating products, and will include an under the hood look at high-speed deep packet inspection testing along with real experiences culled from our extensive 10 Gbps IPS Comparative Test. This webcast helps you in Finding out why...

    Provided By NSS Labs

  • Webcasts // May 2010

    Hiring the Next-Generation of Cyber Security Professionals in Government

    The need for cyber security professionals is an immediate concern, for all levels of government, and Lewis Shepherd of Microsoft Research, through this webcast tells you the necessity for hiring the Next-Generation of Cyber Security Professionals in Government. One can join in this webcast for free and this 60minutes web...

    Provided By O'Reilly Media

  • Webcasts // Jan 2010

    Increase Sales Performance and Enhance Customer Service

    This webcast by Cisco offers information regarding their Cisco In-Store Digital Media solution through which one can attract as well as retain a customer-focused sales force. This In-Store Digital Media solution offers various solutions which include training videos, educational information, human resources announcements and product information. This suit of Cisco...

    Provided By Cisco Systems

  • Webcasts // May 2010

    TechNet Webcast: Disaster Recovery and Advanced Data Protection Manager 2010 Scenarios (Level 100)

    Has one heard about Disaster Recovery on data? Data is the information of any resource which is used in any organization. This is the basic element of a project to develop, and maintain the business in a successful manner, and also data needs for developer of organizer's decision of business...

    Provided By Microsoft

  • Webcasts // May 2010

    TechNet Webcast: Windows 7 Security Talk (Part 2 of 3): Networking Security and Application Control (Level 200)

    This TechNet webcast is all about the Windows 7 security talk, and also some of the networking security an application control of level 200 present in it. The discussion about Windows 7 security talk series comes in two parts, both the parts covers many things about the presence of networking...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Business Success with SAP Retail and AFS

    Wolverine World Wide Inc is one among the global footwear giants, and the leader in the global marketer of the branded apparel, and footwear. Following the strategic plan for product innovation, global expansion, and brand development it recorded annual revenue of $1.2 billion in the year 2008 which is considered...

    Provided By CIBER

  • Webcasts // Jan 2010

    Lawson 9 Security: Maximizing your Investment

    Does one know the range of solutions and approaches the new Lawson security module provides? Hear about the new and improved Lawson security module, tips and techniques for implementation, and how it will improve the business. This webinar will teach the attendee how to: Plan for their auditing and compliance...

    Provided By CIBER

  • Webcasts // Jan 2010

    Making the Most of Your Lawson System

    Does one need to ensure that the new or existing system will perform effectively with new products? Learn the importance of Performance Testing and how a correctly executed Performance Test will help improve the business. This webinar will teach the attendee how to decide if Performance Testing is necessary for...

    Provided By CIBER

  • Webcasts // Jan 2010

    Maximizing ROI and Getting More from Your JDA MMS

    Today's retailers need to respond to a competitive marketplace through enhanced flexibility and speed. To do this, they need to transform their technology capabilities and keep their applications running efficiently. The JDA MMS solution/implementation is the best strategy for using a single application to work across your global branches to...

    Provided By CIBER

  • Webcasts // Jan 2010

    Storage Solutions for Managing Information Growth

    The speakers of this webcast are Joe Smothers, LSI Corporation Tom Hughes, CIBER, Inc.In. Here the attendee can learn how they can leverage affordable storage technology from IBM and CIBER while maintaining cost controls. Whatever be the company's size, one can know these four trends which addresses every business requirements....

    Provided By CIBER

  • Webcasts // Jan 2010

    Understanding the Value of MPLS Encryption

    This webinar will cover a complete and brief introduction to MPLS, The advantages of moving to MPLS services, the security implications. This webinar will introduce MPLS and underscore its increased acceptance and popularity based on maximization of data transport resources and reduced cost enabling a strong return on investment. Based...

    Provided By THALES

  • Webcasts // Jan 2010

    Unlock Your Legacy Assets Through Modernization

    This webinar is presented by Cindy Howard, ATERAS EVP, Conversion Solutions and John Bird. Legacy environments simply can't handle the real-time business needs of today without challenges and work-arounds. The licensing cost for all the software required to run a mainframe are through the roof and only increasing. Legacy resources...

    Provided By CIBER

  • Webcasts // Mar 2010

    Analyst Webcast: Managing IT's Business Value With Service Portfolio Management

    Service portfolio management has become an important component in any Information Technology company. It helps IT organizations to be more systematic in demonstrating, and maximizing IT's business value. One can use the business technology services as a common reference point for IT, and one can find answers for questions such...

    Provided By CA

  • Webcasts // Oct 2009

    Securing Architectures and Applications for Network Convergence

    Manufacturers today can make smart decision at the same time make better business because the manufacturers are able to access to manufacturing data through the advanced convergence of both manufacturing, and enterprise networks which has offered them. This has provided the manufacturers, the competitive edge than the rest. What ever...

    Provided By Cisco Systems

  • Webcasts // May 2010

    TechNet Webcast: What's New in Forefront Protection 2010 for SharePoint? (Level 300)

    By attending this extraordinary webcast, one can study lot of things about the new Microsoft Forefront Protection 2010 for SharePoint in short FPSP product, and how it provides protection, and security from malware and out-of-policy content when one is about to upload, and download the content to the Microsoft SharePoint...

    Provided By Microsoft

  • Webcasts // May 2010

    MSDN Webcast: Security Talk: Using Standards-Based Internet Explorer Features to Protect Apps (Level 200)

    Security is the most important feature, and essential feature in any web application. Authentication and authorization are some of the parts available at security related topics. This security protects the web application, or any application for unauthorized persons, and hackers etc. There are several things that are available in security...

    Provided By Microsoft

  • Webcasts // May 2010

    TechNet Webcast: SQL Server 2008 R2: Securing Your System (Level 300)

    SQL Server is the advanced database engine. It is used for storing data, manipulating data, maintaining data, back up data, etc. SQL Server 2008 is the latest version of SQL Server. This provides additional, and advanced features that not available in the previous versions. The features are security; restore data,...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Mar 2010

    Secured eUSB - How to Protect Your Organization From Portable Devices

    With the advancement in technology there are many ways through which one can protect their laptops, computers and other devices but there is no solution for the protection of the portable devices. Portable devices are usually designed for the ease it offers while using like transportation. There is no such...

    Provided By Vimeo

  • Webcasts // Mar 2010

    Secure Document Collaboration for Microsoft SharePoint

    This webinar series helps the attendee gather information regarding data loss prevention technology. It also offers the attendee information on the first to market secure document management, and the collaboration with the industrial giants Microsoft technology. The other topics that are covered in this webinar include management of secure groups,...

    Provided By Vimeo

  • Webcasts // Aug 2009

    End Point Security - How to Protect Your Network From Portable Devices!

    Based on the research conducted by the Ponemon Institute 59 % of the people who lost their job due to misusing or taking the confidential company information with them either on DVD or using USB drives. The risk has dramatically increased in the intentional and unintentional data leaks and other...

    Provided By Vimeo

  • Webcasts // Jan 2010

    DLP - Easy as 1,2,3..

    Data loss is a negative impression on the organization which can have a drastic effect, such as reduced trust from customers, and from the partners, corporate value reduction, and loss of competitiveness as well as various criminal, and legal issues. It is very crucial for the organizations to protect sensitive...

    Provided By Vimeo

  • Webcasts // Jul 2010

    Evaluating the Security of Google Apps

    On demand version of this webinar. Despite the ever rising popularity of cloud computing solutions, many IT professionals remain concerned about security and compliance. However, as one of the fastest growing cloud solutions, Google Apps is actively addressing these concerns by offering simple, powerful, and secure communication and collaboration tools...

    Provided By Google

  • Webcasts // Jul 2010

    Live TechRepublic Webinar: Evaluating the Security of Google Apps

    Despite the ever rising popularity of cloud computing solutions, many IT professionals remain concerned about security and compliance. However, as one of the fastest growing cloud solutions, Google Apps is actively addressing these concerns by offering simple, powerful, and secure communication and collaboration tools for organizations of all types and...

    Provided By Google

  • Webcasts // May 2010

    CA Mainframe Output and Enterprise Report Management Latest Trends

    Need to secure the information and prevent loss of data for compliance purposes? The attendee of this webcast "The CA Output and Enterprise Report Management (CA ERM)" development team will hear about the latest trends, including how to use CA ERM products to address compliance level encryption issues, how to...

    Provided By CA