Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2014

    USB Write Blocking with USBProxy

    USB mass storage devices are some of the most common peripherals in use today. They number in the billions and have become the de-facto standard for offline data transfer. A USB write blocker may help to prevent some of these issues and allow researchers to examine the content of the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Run-Time Tools to Aid Application Security Assessments

    In this webcast, the presenter explains about the common tracing tools and their use in day-to-day application security assessments. The presenter also explains the run-time tracing concepts and their practical applications in real world testing scenarios.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introducing Opabinia

    Checking for SSL issues form part of most infrastructure and web application assessments. However, these checks often are not detailed enough and can miss important issues. In this webcast, the presenter will introduce SSLAuditor4/Opabinia, a tool have automated SSL checks, making the task easier for the tester, while improving the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Virus, Malware, and Threats Oh My!?

    The current proliferation of malware and other threats have created an entire economy for cybercriminals; in today's world, the reality is that a determined adversary can always get in. In this webcast, the presenter will discuss tactics for detection and containment and includes a threat history review covering the last...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Why Information Security Should Be Important to All of Us

    In this webcast, the presenter tries to show how information security as an impact on all the people lives. The user's password and their identity, a company's repetition is all require good information security management, on an individual level.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Honeywords: Detectable Password Theft

    Password theft is an ever increasing problem. One of the challenges of password theft is detecting it. A possible solution to this problem is the use of \"Honeywords\". In this webcast, the presenter examines the implementation of Honeywords, the effectiveness of it as a solution and how the concept can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Easy Ways to Bypass Anti Virus Systems

    Malicious software is all around the people. It permeates the Internet by riding on data transmissions. Once the user communicates, they risk getting in touch with malware (another name for malicious software). This is why every single one of the user, be it individual, company or organization, runs anti-virus software.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Contininuous Security Testing in a DevOps World

    In this webcast, the presenter explains about the BDD-security framework. Which is designed to solve some of these challenges by providing security teams and developers with the tools to: specify the security requirements in a human readable form, make those same requirements executable tests that can be run against a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    CSP Analysis - Attacking XSS Mitigation

    In this webcast, the presenter will given an introduction into the \"Content Security Policy (CSP)\" HTTP header. The CSP is basically an HTTP header it requests the site and gets response from server. It allows loading sources like java script files, style sheet and images etc.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    TCP Denial of Service Vulnerabilities

    The Transmission Control Protocol (TCP) is one of the fundamental protocols used in today's communication networks. Recently, there has been an increased discussion on possible Denial of Service (DoS) attacks against TCP-based services, which has largely been triggered by the partial disclosure of several vulnerabilities by the security company Outpost24....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking NFC Mobile Phones

    Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vulnerability Discovery in Closed Source/Bytecode Encrypted PHP Applications

    Security audits of PHP applications are usually performed on a source code basis. However, sometimes vendors protect their source code by encrypting their applications with runtime (bytecode) encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cisco IOS Attack and Defense

    In this webcast, the presenter covers the past, present and future of Cisco IOS hacking, defense and forensics. Starting from the historic attacks that still work on less well managed parts of the internet, the powerful common bugs, the classes of binary vulnerabilities and how to exploit them down to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to New Stream Cipher Designs

    Even with \"Nothing to hide\", the user want to protect the privacy of their bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, BitTorrent, SSL), A5/1 (GSM telephony), E0 (Bluetooth), as...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Rich Internet Applications

    In this webcast, the presenter will examine the largely under researched topic of Rich Internet Applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Methods for Understanding Targeted Attacks with Office Documents

    In this webcast, the presenter will give an overview about the office file format. The presenter also explains the in-depth technical details and practical analytical techniques for triaging and understanding these attacks, defensive mechanisms to reduce the effectiveness of the attacks, forensics evidence that can help trace the attacks, static...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Failures in Smart Card Payment Systems

    PIN Entry Devices (PEDs) are used in the Chip & PIN (EMV) system to process customers' card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security and Anonymity Vulnerabilities in Tor

    There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Further, the academic research community has been coming up with increasingly esoteric and increasingly effective, attacks against all anonymity designs, including Tor.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud-Based Detection Techniques for Botnets and Other Malware

    Traditional techniques for detecting malware, such as viruses, worms and rootkits, rely on identifying virus-specific signature definitions within network traffic, applications or memory. Botnets are ideally suited for launching mass Distributed Denial of Services (DDoS) attacks against the ever increasing number of networked devices that are starting to form the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Monitoring Web Sites for Malware Injection with Web Detector

    It's estimated that 86% of all websites had at least a serious vulnerability during 2012. Attackers either manually or automatically (via botnets) deploy C&C servers and malware droppers within exploited websites to infect clients. When such an intrusion is not detected by the owner, the website can deliver malware for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Active Scan Augmenting Manual Testing with Attack Proxy Plugins

    In this webcast, the presenter will introduce ActiveScan++ and demonstrate how it can be used to easily identify complex vulnerabilities in real world applications. ActiveScan++ is an open source Python plugin that builds upon Burp Suite's basic active scanning functionality.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Continuous Security Testing in a Devops World

    In this webcast, the presenter will present an open source security testing framework that aims to address them through the use of Behavior Driven Development (BDD). BDD offers a communication bridge between security, development and testing so that security requirements can be defined in a natural language; and yet still...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Keynote - Copper Droid on the Reconstruction of Android Malware

    In this webcast, the presenter presents the CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behavior of Android malware. Based on the key observation that all interesting behaviors are eventually expressed through system calls, CopperDroid presents a novel unified analysis able to capture both low-level OS-specific and high-level...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Password Defense: Controls Your Users Won't Hate

    Passwords are a necessary part of nearly every information system. From a least interesting user to the highest privileged administrator, a last line of defense to protect sensitive information is a string of characters.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Locksport: A Brief Introduction

    In this webcast, the presenter will give an overview about the physical security, types of locks and how they work, how the user open locks without keys or combinations. The presenter also explains the Cleveland Locksport community, rules, and guidelines, and recommendations for enhancing security at home and elsewhere.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking and Defending Full Disk Encryption

    Many organizations are flocking to full disk encryption solutions as a solution to their data security requirements. Unfortunately, many of these installations view the deployment of full disk encryption as a panacea for any and all security concerns for their laptop fleets. All too often, these systems are not properly...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Threat Models That Exercise Your SIEM and Incident Response

    In this webcast, the presenter presents a case study on taking actual security incidents, creating threat models, and using the models to create red team exercises. The resulting red team exercises are then used to evaluate their technical controls (SIEM, vulnerability management) and incident response.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of the Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    SWF and the Malware Tragedy

    In this webcast, the presenter explains possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF. While there are some tools out there to analyze AS2 and AS3 based SWF, using various techniques, analysis of SWF can become a nightmare.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Short Attention Span Security

    In this webcast, the presenter will explain about script injection in flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors, Auto-WEP key cracking with ITX, porting network security tools to the iPhone. Along with this, the presenter can make some code available for the hex editor, a bunch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security of MICA-Based Wireless Sensor Networks

    In this webcast, the presenter mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together

    Developers want to write code and security testers want to break it and both groups have specialized tools supporting these goals. The problem is - security testers need to know more about application code to do better testing and developers need to be able to quickly address problems found by...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2009

    Network Topology Analysis: The Most Effective Way to Prioritize Security Initiatives

    The rate of discovery of new vulnerabilities continues to increase, and security and operations teams simply do not have the resources to keep up. The attendee will learn how nCircle's new Topology Risk Analyzer prioritizes risk remediation using vulnerability and network topology-line of sight-risk, enabling IT staff to focus on...

    Provided By nCircle

  • Webcasts // Jan 2009

    Analyzing Your Network Security Risk With nCircle's Suite360 Intelligence Hub

    The attendee of this webcast will discover how to take advantage of IP360's open architecture to integrate the network intelligence gathered by IP360 and the existing systems and leverage that intelligence to measure, manage, and reduce network risk. The attendee will learn how nCircle's Security Intelligence Hub goes beyond simply...

    Provided By nCircle

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Hacking Exposed Webinar

    The presenter of this webcast outlines the state of hacking as it exists today. He also profiled three contemporary hacks with associated countermeasures. The hacks profiled include hacking the web: Cross-Site Request Forgery, Hacking SSL: SSLstripe, Hacking the Phone: What happens when the root access "feature".

    Provided By McAfee

  • Webcasts // Nov 2009

    Video: Upgrading to Oracle Database 11g Release 2

    Consolidate. Compress. Control. Watch the free, on-demand video to hear how IT leaders are turning to Oracle's second release of Oracle Database 11g to drastically reduce costs and easily manage their environments, database and storage. Learn how to easily upgrade to 11g. Watch Now! Best viewed in Internet Explorer enabled...

    Provided By Oracle

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Oct 2009

    Optimizing the Security of Single Sign-On Using Active Directory With Kerberos

    The attendee will gain deeper knowledge of Kerberos - the stronger, more secure, third-party authentication service that is simple to execute. PistolStar CTO, Gregg Browinski, unveils the security and administration benefits of utilizing Microsoft Active Directory and the Windows-based Kerberos authentication protocol to achieve single sign-on to Lotus Domino applications...

    Provided By PistolStar

  • Webcasts // Oct 2009

    Technical Track: Dramatically Simplified Capacity Management

    How to simplify capacity management in a virtualized environment? The attendee of this webcast will learn about new capabilities that enable IT to align virtual infrastructure capacity with business demands in a more timely and cost-effective manner.

    Provided By VMware

  • Webcasts // Oct 2009

    Small and Medium Business: Cost-Effective Ways to Deliver Always on IT

    How to deliver affordable high application availability and data protection to the business? The attendee of this webcast will learn about cost-effective packages designed exclusively for SMBs. The attendee will learn the most cost-effective way for SMBs to deliver Always On IT.

    Provided By VMware

  • Webcasts // Nov 2009

    On-Demand Webcast: The New World of SharePoint Administration

    Get the insight you need to prepare for SharePoint 2010 in this Quest Software on-demand webcast. Joel Oleson, senior architect and SharePoint expert, takes you inside the life of a SharePoint 2010 administrator to learn about its "new world." Discover how the redesigned central admin, health rules and throttles and...

    Provided By Dell Software

  • Webcasts // Dec 2009

    Take a smarter approach to archiving: Control cost while unifying data and content

    Enterprise information continues to explode with increasing Volume, Variety and Velocity. Organizations need options to control storage costs and simplify the collection and management of archived information through common ingest and classification. Doculabs and IBM discuss: Industry trends in the area of content and data archival A business...

    Provided By IBM

  • Webcasts // Sep 2009

    How Ready Are You to Upgrade to Microsoft Windows Server 2008?

    There has been a lot of buzz about Server 2008, otherwise known as Longhorn. But the question on many IT peoples' minds is whether their infrastructure is ready for it. Wouldn't it great if there was a tool that would let you know? Fortunately a Readiness Advisory Utility is available...

    Provided By Dell

  • Webcasts // Sep 2009

    Overview of New Security Features in Windows Server 2008

    Microsoft Longhorn, otherwise known as Microsoft Windows Server 2008 has a lot of new features, especially deployment and security features. Today we're talking about Bitlocker. No, it isn't a place where you keep all your bits. It is an important component Longhorn that adds two cool new features: Whole disk...

    Provided By Dell

  • Webcasts // Nov 2009

    Live Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Live WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    WebEvent: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Web Event: Haunted by Symantec Ghost? Learn About a New and Superior Approach

    Retro fashion might be in style, but old-fashioned point-imaging solutions such as Symantec Ghost lack important capabilities and cannot save you the time and money of more contemporary solutions. Join this live TechRepublic Webcast featuring Chris Blake, Systems Technician with Benchmark Group. Chris will share with you real world...

    Provided By KACE

  • Webcasts // Nov 2009

    Webinar: Securing the Cloud Dec 10th, 2pm ET / 11am PT

    Cloud computing promises to provide vast computing power, reliable off-site data storage, wide availability, all at lower maintenance and investment costs. But recent cloud computing mishaps have underscored the need for consistent and thorough security policies implemented in the design stage. Hear security experts explain recent key learnings on...

    Provided By Enterprise Florida

  • Webcasts // Dec 2009

    Do you have what it takes to be a Game Changer?

    Who should get this: Like all EPLM assets this piece is aimed at senior management (those in a business that are responsible for business outcome). Why should they watch it? This is a great thought-piece in the area of Enterprise Engineering by two of Rational's experts. It discusses a new...

    Provided By IBM

  • Webcasts // Dec 2009

    TechNet Webcast: Microsoft Secure Messaging Solution (Level 300)

    The presenter of this webcast takes the attendee through the best practices and technologies that are available to protect the e-mail platform from virus, malware, and information leakage. The attendee will learn how to protect the e-mails from malware and inappropriate content, protect the e-mails from leaking into the wrong...

    Provided By Microsoft

  • Webcasts // Dec 2009

    TechNet Webcast: What's New in Forefront Threat Management Gateway 2010? (Level 300)

    Microsoft Forefront Threat Management Gateway 2010 is the new and much improved version of Microsoft Internet Security and Acceleration (ISA) Server. This webcast covers the new features and improvements that have been introduced in Forefront Threat Management Gateway 2010, including new protection mechanisms (Edge Malware Protection, Network Inspection System, URL...

    Provided By Microsoft

  • Webcasts // Dec 2009

    Momentum Webcast: The Future of Business Productivity (Level 100)

    Unified Communications and Collaboration platform provides seamless user experience, increases efficiency and saves cost for businesses. The attendee of this webcast will discover how Microsoft Business Productivity solutions help organizations meet changing business needs while manage IT cost and complexity. During this live webcast, the attendee will get a sneak...

    Provided By Microsoft

  • Webcasts // Aug 2009

    Healthcare Data Security Update: Latest Changes and What Technologies You Need to Comply

    With the recent passage of the HITECH Stimulus package, Congress has created much talk and activity with regards to electronic medical records. But there are measures in the act that have nothing to do with money for EMRs that will affect all healthcare providers. With enactment of the American Recovery...

    Provided By Vendome Group

  • Webcasts // Dec 2009

    Affordable Business Continuity Solutions for SMBs

    How to achieve high application availability and data protection without taxing the SMB budget? The attendee of this webcast will learn about cost-effective packages designed exclusively for SMBs.

    Provided By VMware

  • Webcasts // Dec 2009

    Securing Your Data Against the Latest Multi-Vectored Security Threats

    Data leaks, losses and thefts are now firmly on the boardroom agenda Why? Because organizations are being embarrassed, sued and even put out of business because of this serious security issue. This webcast can help the organization from becoming another victim. Research shows that 62% of fraud is committed by...

    Provided By Reed Elsevier

  • Webcasts // Nov 2009

    Cloud Security - New Threats on the Horizon

    Cloud computing means a range of different things to different people, but one thing that people are agreed on, and that is the need for cloud security. This webcast will explain why most organisations need to re-engineer their existing IT security infrastructure before adding the benefits of cloud computing to...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    The Security Implications of Web 2.0

    There can be no doubt - the collaborative benefits of Web 2.0technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. But, just as Web 2.0 brings new and significant advantages to the business table, so there are new and highly threatening security...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

    o Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry's Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges...

    Provided By Reed Elsevier

  • Webcasts // Sep 2009

    Protecting Your Critical Data on a Budget

    The threats that organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared. It's against this backdrop that now there is need to defend against a rising level...

    Provided By Reed Elsevier

  • Webcasts // Dec 2009

    TechNet Webcast: What's New in Forefront Protection 2010 for Exchange Server? (Level 200)

    The attendee of this webcast will learn about Microsoft Forefront Protection 2010 for Exchange Server and the new capabilities one has for protecting the Microsoft Exchange Server environment. The presenter will walk the attendee through anti-spam, anti-malware, and hybrid protection scenarios that benefit from a Forefront Protection 2010 for Exchange...

    Provided By Microsoft

  • Webcasts // Nov 2009

    Using CDP for Affordable Application Recovery

    One leverage Continuous Data Protection (CDP) to cost effectively protect VMware environments. The attendee will learn best practices for protecting, recovering, and rolling back virtual servers to any point in time - to make disaster recovery rapid, reliable, manageable, and affordable.

    Provided By EMC

  • Webcasts // Oct 2009

    Making the Digital Office a Reality

    Transforming the growing volume of paper documents into electronic information reduces the costs, risks, and inefficiencies of dealing with paper in the workplace. The presenter will explore the challenges of moving from paper to digital, and discuss the steps to take to make the digital office a reality. The attendee...

    Provided By EMC

  • Webcasts // Dec 2009

    Disaster Recovery for Virtual SAP Environments

    Most organizations demand the highest level of protection for their virtual SAP environments - and need a flexible Disaster Recovery (DR) solution to minimize downtime. The presenter of this webcast details technical description of data protection solutions and a DR demonstration for virtual SAP environments using EMC RecoverPoint integrated with...

    Provided By EMC

  • Webcasts // Nov 2009

    Cut Data Protection Costs With Deduplication

    Virtualized environments are challenging traditional data protection infrastructures and processes. With EMC Avamar and Data Domain backup-to-disk with data deduplication and automated centralized management, one can meet data protection requirements for virtualized environments and reduce costs in the backup infrastructure. The attendee of this webcast will learn how to automate...

    Provided By EMC

  • Webcasts // Oct 2009

    Harnessing Untapped I/O Potential on Commodity Hardware

    Building a networked storage system on this hardware yields mixed results: preliminary experiments show that operating systems must be re-engineered to scale to this level of performance. This webcast explores the use of enhanced I/O in a well-understood computational problem: solving boundary value problems with numerical methods. The attendee will...

    Provided By EMC

  • Webcasts // Sep 2009

    Securing VMware Environments With RSA

    Virtualization brings tremendous flexibility in how IT resources are deployed and used - resulting in operational and cost efficiencies. This flexibility may seem to generate risk, but with RSA one can realize the benefits of virtualization without compromising security. The attendee will understand key security considerations for virtualization.

    Provided By EMC

  • Webcasts // Jan 2009

    Completing Your IS Program With CyberSecurity Insurance

    The attendee of this webcast will see how CyberSecurity by Chubb can complete the information security program by picking up where IT defenses and internal security policies leave off.

    Provided By Core Security

  • Webcasts // Nov 2009

    Data Protection Strategies: Deduplication for More Efficient Backups

    On-Demand 8 minute Webcast: Data proliferation coupled with increasing pressures to ensure comprehensive data protection is driving organizations to evaluate technologies to help them meet these requirements. Deduplication technologies can deliver more efficient backups of critical data and this on-demand webcast offers an overview of deduplication and key consideration factors....

    Provided By Dell EqualLogic

  • Webcasts // Nov 2009

    E-Business Suite Spotlight Video

    3 Minutes with Free Tool Can Save Thousands! The EBS ROI Tool quickly points out the benefits of upgrading to EBS R12 on IBM hardware. Uncover improved productivity and better value. See how you can improve decision-making while reducing your total cost of ownership through process efficiencies and technology simplification.

    Provided By IBM