Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Novell Cloud Security Service

    In this webcast, the presenter going to show the users' how they can harness the technology of the future with Novell Cloud Security Service. The presenter also going to explain about how service providers can manage multi-tenant SaaS infrastructures.

    Provided By Novell

  • Webcasts // Jan 2014

    Identity and Security Services Video

    In this webcast, the presenter gives an overview of Novell services for identity and security. The presenter also explains about different identity strategy, web access management, security audit, identity management deployment and password management.

    Provided By Novell

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Provided By Workday

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Oct 2013

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Oct 2013

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Sep 2013

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware

  • Webcasts // Sep 2013

    Moving to Microsoft Exchange 2013?

    Are you ready to make the move to Exchange 2013 and enjoy its new, powerful features? In this archived webcast, see if your company is ready for this important migration and the steps to take for it to be a success. Watch it today.

    Provided By Dell Software

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel

  • Webcasts // Sep 2013

    Video: Editors' Q&A on Infrastructure as a Service

    Cloud computing encompasses a lot of different technologies but the two biggest categories are Software as a Service (apps) and Infrastructure as a Service (servers). The IaaS providers make a very convincing argument for businesses to stop running their own data centers and simply purchase server capacity on-demand and scale...

    Provided By ZDNet

  • Webcasts // Sep 2013

    Video: Editors' Q&A on Infrastructure as a Service (UK)

    Cloud computing encompasses a lot of different technologies but the two biggest categories are Software as a Service (apps) and Infrastructure as a Service (servers). The IaaS providers make a very convincing argument for businesses to stop running their own data centers and simply purchase server capacity on-demand and scale...

    Provided By ZDNet

  • Webcasts // Nov 2009

    Building the Security Infrastructure

    The presenter shows how to build out a security infrastructure once a Security Policy is defined. The presenter focuses on implementing the security policy and Financial implications (budgets, ROI, etc.).

    Provided By Anue Systems

  • Webcasts // Dec 2009

    Improving Security Monitoring Using Advanced Filtering Techniques

    With the move to 10G in full force, it is important to filter data so tools are not overloaded but can still complete their assigned tasks. This webcast shows types of traffic traversing today's networks. It shows how to best filter that data on a continuously changing and dynamic network...

    Provided By Anue Systems

  • Webcasts // Jul 2009

    The Spread of Web-Based Malware and New Defenses

    Web sites and web pages have become the new frontier for malware distribution. Over the past two years, there has been a fundamental shift in how malware is distributed - while teenagers used to write viruses which required users to click on email attachments to propagate, financially motivated cybercriminals now...

    Provided By Stanford University

  • Webcasts // Jan 2010

    QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • Webcasts // Jan 2010

    From Cost to Profit Center: Optimize Your IT for Success Webinar

    In these difficult economic times, companies must improve their business performance as much as possible. This webcast will help to turn the IT department into a profit center. The attendee will learn how to understand timing issues to meet business needs and maximize the resources and how to reduce capital...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Net Talk: Sun Identity Manager 8.0

    The presenter of this webcast discusses key market drivers in Identity Management today new features Sun has developed to address those drivers and the increased Role Management capabilities built into this latest release.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Access Management & Federated Single Sign-On

    How to enable federated communication without tearing apart the existing identity infrastructure? The presenter will give an overview of the technology and issues behind the management of identities - both inside and outside the organization - and examines Sun's standards-based access management and federated single sign-on solutions.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Create a Secure Environment to Share and Explore

    Sun has been an industry leader in developing and implementing innovative security technologies and solutions. The presenter gives succinct overview on Sun's technology solutions from the operating platform to encryption management.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    HITRUST Community Extension Program - Business Associates: Security Threat or Opportunity?

    The attendee of this webcast will learn how the HITRUST Common Security Framework (CSF) and CSF Assurance Program can strengthen the business associates' security and compliance programs. The attendee will gain insights shared from Verizon's investigation of over 285 million breached records to give the intelligence one need to ensure...

    Provided By Verizon

  • Webcasts // Jan 2010

    Data Breaches - "What You Don't Know Can Hurt You"

    The presenter will review key findings of the Verizon Business Data Breach Investigations Report, and attendee will hear recommendations and good risk management practices for the Extended Enterprise.

    Provided By Verizon

  • Webcasts // Jan 2010

    Setting Your IT Security Priorities for 2008

    The presenter will provide the latest threat trends and statistics, examine reasons for the new threats, such as social networking and targeted attacks. The presenter will illustrate ways to ensure organisation is protected and highlight the benefits of a managed security solution.

    Provided By Verizon

  • Webcasts // Jan 2010

    Better Security With Your Partners

    To remain competitive the business cannot be confined. Data and details must span systems, countries, languages, and borders. Supply chains need to be connected to meet customer and market demands. Now that organizations have opened up their data to their partners and suppliers they need to take a closer look...

    Provided By Verizon

  • Webcasts // Jan 2010

    Better Security Through a Proactive Approach

    The attendee of this webcast will learn easy ways to understand security challenges, select an appropriate security controls framework, check the implementation of the security plan and demonstrate compliance to security standards. The presenter gives a proven approach that can be incorporated into the information security planning, and discusses how...

    Provided By Verizon

  • Webcasts // Jan 2010

    Better Security Through the PCI Data Security

    The presenters walk through the basic tenets of the Payment Card Industry (PCI) data security standard, some misconceptions and the best way to tackle PCI compliance. For merchants of all levels, this webcast discusses how to protect credit card data and proactively detect vulnerabilities.

    Provided By Verizon

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Oct 2009

    Optimizing the Security of Single Sign-On Using Active Directory With Kerberos

    The attendee will gain deeper knowledge of Kerberos - the stronger, more secure, third-party authentication service that is simple to execute. PistolStar CTO, Gregg Browinski, unveils the security and administration benefits of utilizing Microsoft Active Directory and the Windows-based Kerberos authentication protocol to achieve single sign-on to Lotus Domino applications...

    Provided By PistolStar

  • Webcasts // Dec 2009

    HP Software-as-a-Service (SaaS): Getting Business Results Faster At a Lower Cost

    If you're like most companies, your IT budgets are being tightened while your organization is faced with pressure from the business to obtain quicker value from your investments. HP SaaS allows you to experience the full benefits of HP's Business Technology Optimization solutions immediately while reducing your upfront costs. Learn...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2010

    Qualys - Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    PCI Compliance 2008: What You Need to Know

    Speaker: Sumedh Thankar, PCI Compliance Lead Engineer, Qualys This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward break-down on all the new PCI changes. You'll also learn about today's best...

    Provided By Qualys

  • Webcasts // Jan 2010

    Winning the PCI Compliance Battle - Best Practices to Manage the PCI Process

    Speaker: Terry Ramos, Director Strategic Development, Qualys The Payment Card Industry Security Data Standard, or PCI, protects cardholders and businesses by establishing standard practices for processing, storing and transmitting credit card data but thefts still occur at an unprecedented rate. This webcast will explore: * Compliance Requirements of the PCI...

    Provided By Qualys

  • Webcasts // Jan 2010

    Fast Track: Planning & Deploying an Effective Vulnerability Management Program

    Speaker: Jonathan Bitle, Qualys This webcast covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets. Key take-aways: Integrating the 3 critical factors - people, processes & technology Saving time and money via automated tools Anticipating...

    Provided By Qualys

  • Webcasts // Jan 2010

    Proactive Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. In this talk, Dr. Chenxi Wang, Principal Analyst for Security and Risk Management at Forrester Research, will cover the key aspects of proactive vulnerability management and more importantly, the steps via which you can follow to achieve...

    Provided By Qualys

  • Webcasts // Jan 2010

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution automates these processes for fast, cost-effective remediation and policy...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution...

    Provided By Qualys

  • Webcasts // Jan 2010

    Automating Policy Compliance and IT Governance

    Speaker: Jason Creech, Qualys This webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives. Key take-aways: * Defining current IT GRC challenges * Reviewing regulatory lansdscape and compliance requirements * Automating...

    Provided By Qualys

  • Webcasts // Jan 2010

    Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Energy Efficient Data Center: The Role of Modularity in Design and Deployment

    The attendee of this webcast will learn how to create a state of the art enterprise data center by combining best of breed modules to yield performance and efficiency across the board. This in-depth technical webcast is created for architects in the IT industry by Sun's engineering community and offers...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Attacking Complexity With Simplicity - Sun Identity Management

    Sun offers a pragmatic approach for solving today's everyday identity management issues while positioning the business for the growth challenges of tomorrow. In order to maintain security, mitigate risk and reduce costs, organizations can build their secure, everyday enterprise with Sun's flexible, market-leading identity management solutions. The presenters of this...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Access Management, Federation and Secure Web Services With OpenSSO Enterprise

    The presenters will discuss OpenSSO innovation and how it pushes access management, federation and secure Web services capabilities to a new level. The attendee will learn how to solve challenges around internal access management, extranet authentication, federation, and securing Web services with a single, open source solution.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    PCI DSS Compliance Webinar Replay

    The attendee of this webcast will learn how identity and access management solutions form one of the most important building blocks in establishing the necessary safeguards against malicious access to sensitive information. The presenter will look at how identity management can help address some of the key requirements of PCI...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Solaris 10 Security Features

    The presenter of this webcast talk about several underutilized security capabilities of the Solaris 10 OS. The presenter focuses on 5 key security features, provides examples of each, and touches on how they build on and benefit each other.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Webcast: Securing Your Web Applications

    As more application traffic moves to the web, the information assets are facing new security threats. Web application security is a comprehensive, policy-based method designed to help manage these emerging threats at the application level, so one can prevent attacks that no other firewalls can address. The attendee of this...

    Provided By F5 Networks

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • Webcasts // Feb 2010

    Success Story: Sisters of Mercy Health

    IBM Service Management solutions facilitate a business process transformation that fosters a culture of productivity and continuous improvement. Learn how the Sisters of Mercy implemented changes to improve service quality.

    Provided By IBM

  • Webcasts // Dec 2009

    All Things On Demand

    Traditional customer relationship management (CRM) systems fall short when it comes to usability, deployment and payment speed. Software-as-a-Service (SaaS) 1.0 offers such features, but it is limited in other respects. Adam May, director of product management at Oracle, explains how Oracle On Demand provides all of the business features users...

    Provided By Oracle

  • Webcasts // Dec 2009

    TechNet Webcast: Forefront Threat Management Gateway 2010: Protection Features and Underlying Technologies (Level 300)

    The presenter of this webcast provides an overview of protection features introduced in Microsoft Forefront Threat Management Gateway (TMG) 2010, including malware inspection, URL filtering, Network Inspection System (NIS), and HTTPS inspection. The attendee will to learn about the underlying technologies and relevant implementation details that can help one understand...

    Provided By Microsoft

  • Webcasts // Dec 2009

    Getting Started: Windows Logo Program Part 1

    The presenter of this webcast takes the attendee through the end-to-end process of qualifying for a logo, including how to access logo program requirements and policies, how to run logo program tests, how to troubleshoot test problems, how to make a logo program submission, and how manage the submission.

    Provided By Microsoft

  • Webcasts // Dec 2009

    Getting Started: Windows Logo Program Part 2

    The presenter of this webcast takes the attendee through the end-to-end process of qualifying for a logo, including how to access logo program requirements and policies, how to run logo program tests, how to troubleshoot test problems, how to make a logo program submission, and how manage the submission.

    Provided By Microsoft

  • Webcasts // Nov 2009

    Using CDP for Affordable Application Recovery

    One leverage Continuous Data Protection (CDP) to cost effectively protect VMware environments. The attendee will learn best practices for protecting, recovering, and rolling back virtual servers to any point in time - to make disaster recovery rapid, reliable, manageable, and affordable.

    Provided By EMC