Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Oct 2011

    Screencast: Oracle Database Firewall

    What is a database firewall? What are the important selection criteria in choosing a database firewall? These questions and more are answered by Vipin Samar, Vice President of Oracle Database Security.

    Provided By Oracle

  • Webcasts // Oct 2011

    Screencast: Lower Costs with Oracle Database 11g (related to Lower Costs)

    Discover the benefits of upgrading and consolidating with Oracle Database 11g and Oracle Exadata, to help reduce IT costs and increase business users quality of service throughout the enterprise.

    Provided By Oracle

  • Webcasts // Oct 2011

    How Well Do You Know SSL?

    The presenter, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's a non-commercial research effort to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Oct 2011

    Oracle OpenWorld 2011: BIG-IP ASM & Oracle Database Firewall

    In this webcast, the presenter describes about the BIG-IP ASM and Oracle Database Firewall integration. The presenter also describes about Oracle Database Firewall which will secure and protect both the web and database tiers.

    Provided By F5 Networks

  • Webcasts // Oct 2011

    Konica Minolta on Transforming Enterprise IT Through Cloud Computing

    On demand version of this webinar. Konica Minolta Business Solutions U.S.A. (Konica Minolta) needed to easily integrate multiple corporate acquisitions, move from an old-style on-premise email system, and transform IT's role from tactical to strategic - so the company chose Google Apps. Today, Google Apps not only provides email, but...

    Provided By Google

  • Webcasts // Oct 2011

    Microsoft Exchange or Google Apps? One government agency goes Google

    On demand version of this webinar. Overview: James Ferreira, CIO for the New Mexico State Attorney General's office, had a choice to make to support his growing organization: upgrade to a more costly enterprise license for Microsoft Exchange or find a business grade alternative at a better price. Ferreira investigated...

    Provided By Google

  • Webcasts // Oct 2011

    Guy-Philippe Goldstein: How Cyberattacks Threaten Real-World Peace

    More and more, nations are waging attacks with cyber weapons - silent strikes on another country's computer systems that leave behind no trace. In this Webcast, the presenter shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict- and how one might avert this global...

    Provided By TED Conferences

  • Webcasts // Oct 2011

    Is your network ready for tablets?

    Review the various wireless controller options, video applications for the LAN and WAN, and wireless management control and security strategies that best address new networking demands brought on by data center consolidation, increasing video traffic, and increasing mobile device trends.

    Provided By Cisco Systems, Inc.

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Best Practices to Optimize Performance in eCommerce Production Environments

    In this webinar with retailer The Bon-Ton Stores, learn how they've successfully overcome issues in operating a complex Websphere production e-commerce site to ensure optimal Web application performance and user experience. Dan Gerard, Divisional Vice President of Technical and Web Services at The Bon-Ton Stores, joins to discuss: Overcoming...

    Provided By dynaTrace software

  • Webcasts // Aug 2011

    OSA Interactive Client References Interface on IBM.COM

    Interactive interface for viewing OSA client reference videos and case studies.

    Provided By IBM

  • Webcasts // Aug 2011

    Trends in Business Analytics

    In his presentation "Trends in Business Analytics", Colin White (Founder, BI Research) will explore the impact that trends such as analytic RDBMSes, Hadoop and MapReduce, the NoSQL movement, smarter and real-time analytics, and self-service business intelligence will have on businesses. He will also examine the ways these trends can be...

    Provided By IBM

  • Webcasts // Aug 2011

    Next Generation Security as a Service

    The new UI for the QualysGuard IT Security and Compliance SaaS Suite features interactive dashboards, streamlined workflows, actionable menus and filters with improved visual feedback, making it easier for customers to utilize the comprehensive services in the QualysGuard Suite.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2011

    Live Webcast: IT Budget Killer Series - Taming Data Growth Made Easy

    Your data continues to grow at a staggering rate. Along with the ever increasing volume of data comes the demand for more storage and increased burden of managing a larger storage infrastructure. And overgrown databases can impair the performance of your mission-critical ERP, CRM and custom applications--jeopardizing the superior service...

    Provided By IBM

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel Lucent Enterprise

  • Webcasts // Jul 2011

    When Good Backups Go Bad

    This webcast addresses the top reasons backups fail, the repercussions of those failures, and why it doesn't have to be this way. Attendees will attain a broad understanding of backup and data recovery pitfalls, the serious consequences of those failures, and what to look for in a data recovery solution...

    Provided By Symantec

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Webcast: Why be Social?

    Just as the dawn of e-business changed business forever, ten years later organizations find themselves at another junction point in the evolution of business: the coming of age for Social Business as social computing and social media are integrated into enterprise design. Social Businesses outperform their competitors by embracing social...

    Provided By IBM

  • Webcasts // Jul 2011

    When No Press is Good Press - July 2011

    Yesterday's approaches to combating malware are no longer sufficient. Already this year we've seen an extraordinary number of high-profile security breaches. Whether you're a small business or a large enterprise, a breach of your business's private information can be devastating. Yet many companies continue to play the odds, failing to...

    Provided By Symantec

  • Webcasts // Jul 2011

    Rebecca MacKinnon: Let's Take Back the Internet

    In this webcast, the presenter describes the expanding struggle for freedom and control in cyberspace, and asks: how do they design the next phase of the Internet with accountability and freedom at its core, rather than control? She believes the internet is headed for a "Magna Carta" moment when citizens...

    Provided By TED Conferences

  • Webcasts // Jul 2011

    Mikko Hypponen: Fighting Viruses, Defending the Net

    It's been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. The presenter who is a computer security expert tells the people how they can stop these new viruses from threatening the...

    Provided By TED Conferences

  • Webcasts // Jun 2011

    Security in Google Apps

    Security concerns are all too frequently cited as a key reason that businesses and organizations choose not to embrace cloud computing, despite potential benefits in terms of reduced cost and administrative overhead. Google Apps, the online productivity and groupware suite, has a number of security features built in, both from...

    Provided By TechRepublic

  • Webcasts // Jun 2011

    Removing Administrator Rights & Setting up Policies to Elevate Privileges

    In this 35 minute webcast recording, you'll learn how to discover user accounts and groups that are members of the local "Administrators" built-in user group on computers in your Windows domain. Once the analysis has been run, we'll show you how to can take action, if needed, by removing the...

    Provided By Viewfinity

  • Webcasts // Jun 2011

    Seattle Children's Hospital Implements Desktop Virtualization

    View this webinar to learn how Seattle Children's Hospital was able to successfully deal with compliance issues, security requirements, budget constraints and more, all while ensuring a high quality user experience with Citrix XenDesktop and Wyse Xenith.

    Provided By Citrix & WYSE

  • Webcasts // Jun 2011

    African Elections And Democracy

    Nations across Africa are holding elections, a good sign for emerging democracies on the continent. However, the presenter says the quality of governance in African nations varies widely. Some states are making solid progress toward becoming effective democracies, while others remain under the sway of corrupt leaders, with serious consequences...

    Provided By Brookings Institution

  • Webcasts // Jun 2011

    On-Demand Webcast: Getting Network Out of Gridlock

    Building a network is easy. What isn't easy is avoiding the gridlock that comes with adding new technologies, applications, and end users to the mix. This network congestion can cost your company tens of thousands of dollars per hour while grinding your business to a halt. In this on-demand...

    Provided By Dell Software

  • Webcasts // May 2011

    Operational Data Quality - Data Governance

    Poor data in your business applications often originates from data quality problems in upstream operational systems. That's why it's critical to establish a Data Governance initiative to set standards, improve quality, and monitor how data supports business processes moving forward. Learn how Digital River successfully implemented Data Governance across their...

    Provided By Trillium Software

  • Webcasts // May 2011

    Non-Compliance Costs: Should Your Organization Invest in GRC Tools?

    Compliance regulations are increasing in quantity and complexity. Many organizations are staying on-top of compliance requirements by leveraging an integrated governance, risk and compliance (GRC) framework. Although (GRC) best practices are being adopted as the solution for non-compliance by many, how do you decide whether your organization needs a GRC...

    Provided By ANXeBusiness Corp

  • Webcasts // May 2011

    VIPRE Antivirus Business

    Until now antivirus has been slow and hard to manage - but there is a fast and easy solution, VIPRE Antivirus Business! VIPRE Business offers Fast endpoint protection Easy deployment and manageability Reliable detection and remediation - all at an affordable price!

    Provided By GFI Software

  • Webcasts // May 2011

    Best Practices for Information Quality Management

    To achieve your business goals and objectives, you must first optimize the information that supports all of your business processes. Implementing an Information Quality Management practice and applying Trillium Software's proven best practices will help you maximize the value you get from your information. Apply our Information Quality Maturity...

    Provided By Trillium Software

  • Webcasts // May 2011

    CIO Innovation Panel: Security in the Cloud

    In this webcast, the presenter going to explain about cloud computing. The presenter also discusses discuss the realities of risk in the cloud during a CIO IT business panel moderated.

    Provided By Microsoft

  • Webcasts // May 2011

    Becoming a Social Business - videos

    Social Business videos: See how organizations are transitioning to a social business. Empower people with social networks, engage with experts and clients, and cultivate trust.

    Provided By IBM

  • Webcasts // May 2011

    How It Works: Smarter Commerce

    The 'how' and 'why' of smarter commerce - told through hand-drawn illustrations and simple narration.

    Provided By IBM

  • Webcasts // May 2011

    Securing the Virtual Environment

    The presenter is a Security Architect at LogLogic. In this webcast, the presenter talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM hopping and VM theft.

    Provided By HELP NET SECURITY

  • Webcasts // May 2011

    Client Virtualization. Solved.

    Hear how CDW helped one customer create a virtual desktop infrastructure to centrally manage desktops, reduce costs and maintenance time and improve recovery time.

    Provided By CDW & VMware

  • Webcasts // May 2011

    Detecting Advanced Threats With New Risk Score Correlation and SIEM

    In this webcast, the presenters say sophisticated malware and determined insiders present dual challenges for IT security teams. Insiders understand internal policies and operate "Within the rules," while advanced malware's persistence and stealth can evade most detection technologies.

    Provided By NitroSecurity

  • Webcasts // Apr 2011

    Redistricting For Political Gains

    Every decade since 1790, a census of the entire U.S. population is used by state governments to apportion representatives in the U.S. House of Representatives. But the redrawing of congressional districts that follows the census is an exercise in pure politics, says the presenter.

    Provided By Brookings Institution

  • Webcasts // Apr 2011

    Enterprise Mobility Trends of 2011 published by Sybase

    Discussion on the latest trends in enterprise mobility with the expert authors of the Enterprise Mobility Guide 2011. Topics covered include the latest trends in mobile device management and app development?platforms such as iOS, RIM and Android and hardware such as smartphones and tablets.

    Provided By Sybase Inc.

  • Webcasts // Apr 2011

    B2B Data Exchange and B2B Data Transformation Demo

    Find out how Informatica's B2B products?Data Transformation and Data Exchange?enable multi-enterprise data to be leveraged to support these strategic business objectives.

    Provided By Informatica

  • Webcasts // Apr 2011

    VMware Recovery Revolution

    Download this new white paper to learn how Veeam's new vPower breakthrough technology drastically increases IT's ability to meet tight RTO requirements by enabling administrators to run VMs directly from a backup file without provisioning storage or restoring the compressed and deduplicated backup file.

    Provided By Veeam Software