Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Apr 2012

    Protect Critical Oracle Data Without Risk - or Destroying the Budget!

    Running database backups with Oracle's standard compression feature can require tremendous amounts of time - and deploying Oracle's Advanced Compression solution across the business is expensive. Protecting your Oracle data shouldn't be costly and risky! In this on-demand webcast, see how LiteSpeed Engine for Oracle cuts storage costs, reduces...

    Provided By Dell Software

  • Webcasts // Mar 2012

    Introduction to VMware vSphere Storage Appliance

    This presentation will be available to audience members until August 23, 2012 at 09:00 AM Pacific Daylight Time. Business continuity is a top concern for small and midsize businesses (SMBs), who rely on their applications to keep their businesses running. VMware vSphere 5, the industry's leading virtualization platform, enables...

    Provided By VMware

  • Webcasts // Mar 2012

    Matt Seeley: Lessons From the Yahoo! Tablet Front Page

    In this webcast, the presenter shares lessons learned from building the tablet version, including an overview of the tablet landscape, best practices to deliver UIs to multiple viewports, and @font-face and @media rule usage across iPad and Galaxy.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Optimizing Android Apps With Google Analytics

    Thousands of apps have taken advantage of Google Analytics' native Android tracking capabilities to improve the adoption and usability of Android Apps. This webcast covers best practices for tracking apps on mobile, TV and other devices. The presenter also shows the user how to gain actionable insights from new tracking...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Taking Android to Work

    More and more people are bringing Android devices into enterprise environments. In this webcast, the presenters will cover general enterprise adoption considerations and related Android features. They will also provide an overview of security issues, managed internal app development, corporate app directories, and an in-depth look at a sample implementation...

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: Building Android Apps for Google TV

    In this webcast, learn how to create new apps or enhance existing Android apps for Google TV. Session includes an overview of the platform, best practices, demos, and discussion about the fantastic opportunities Google TV creates for developers.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Oracle Storage Strategy Update

    New digital data will double over the next four years, and is expected to increase from 1,200 exabytes in 2010 to 35,000 exabytes in 2020, a growth of 29X. Architecturally, the world has evolved so that applications, data, and storage are separated. The challenge, then, is to align these key...

    Provided By Oracle

  • Webcasts // Mar 2012

    Introduction to VMware vSphere 5

    This presentation will be available to audience members until August 16, 2012 at 09:00 AM Pacific Daylight Time. The foundation of the new VMware Cloud infrastructure Suite is VMware vSphere5, the most trusted, widely deployed virtualization platform in the world. Architected to support the broadest range of virtual and...

    Provided By VMware

  • Webcasts // Mar 2012

    Google I/O 2011: Evading Pirates and Stopping Vampires

    In this webcast, the presenter explains about best practices for using the License Verification Library and In-App Purchases on Android Market. It also explains how to integrate a server-side component for license validation and content delivery, describing the reference implementation that they built using App Engine.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Google I/O 2011: How to NFC

    Gingerbread brings a comprehensive NFC reader/writer API, and some modest but surprisingly powerful P2P support. In this webcast, the presenter explains about how the users' should care about NFC technology, what kinds of applications are possible right now, and best practices for deployment.

    Provided By Oleksiy Kovyrin

  • Webcasts // Feb 2012

    Avi Rubin: All Your Devices Can Be Hacked

    Could someone hack the pacemaker? In this Webcast, the presenter explains how hackers are compromising cars, smartphones and medical devices, and warns about the dangers of an increasingly hack-able world.

    Provided By TED Conferences

  • Webcasts // Feb 2012

    SEI Technologies Forum: Software, Security, and Resiliency

    In this webcast, the presenter going to explain about the opening remarks at the SEI technologies forum. The presenter will explain how the SEI technologies can help the organizations applied and improved in their software technologies.

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Webcasts // Jan 2012

    Manage Your Sybase Infrastructure With Sybase Control Center

    In this webcast, the presenter explains about Sybase Control Center (SCC) and how one can use SCC to manage, monitor, and troubleshoot one Sybase infrastructure. In this webcast, the presenter discusses the following topics: What products can be monitored with SCC ?, How to generate alerts and be notified of...

    Provided By Sybase

  • Webcasts // Jan 2012

    Making HIPAA Compliant Data Security Simpler to Manage

    In this webcast, the presenter going to discusses about how Dell and Citrix's mobile clinical computing takes an advantage of tested and validated desktop virtualization architectures designed specifically for healthcare providers and integrates them into technologies that have already invested.

    Provided By Dell

  • Webcasts // Jan 2012

    Email Management Service: Email Continuity

    In this webcast, the presenter going to disuses about e-mail management service. The presenter also discusses about e-mail continuity which provides a Dell-hosted solution that effectively eliminates email downtime, no matter what the cause: local infrastructure outages, database corruption, Active Directory corruption, configuration errors, viruses or malware.

    Provided By Dell

  • Webcasts // Jan 2012

    Securing Your Environment

    Keep up with constant and evolving threats to the IT environment. In this webcast, the presenter going to discusses about how Dell secure works can help the user to secure their data and reduce the risk of breaches, downtime and non-compliance.

    Provided By Dell

  • Webcasts // Jan 2012

    Managing Cyber Threats

    In this webcast, the presenter going to discusses about the asset and data protection. The presenter also discusses about how Dell secure works can help enterprise of all sizes manage infrastructure security effectively, recover from attacks and mitigate future risk.

    Provided By Dell

  • Webcasts // Jan 2012

    Protecting Your Business With Smart Security - Biggest Security Threats

    In this webcast, the presenter going to discusses about the computer and network security for small and mid size business. The presenter also discusses about the different type of security attacks and the ways to protect the business with smart security tips.

    Provided By Dell

  • Webcasts // Jan 2012

    Total Business Security

    In this webcast, the presenter going to explains about the security management. The presenter also discusses about total business security management according to their needs of the business and it should be based on user needs, and budget.

    Provided By Dell

  • Webcasts // Jan 2012

    The Right Security Strategy

    In this webcast, the presenter going to explain about the issues in security management. The Presenter also discusses about how cloud one can select the right security strategies and needs of their business based on user needs, and budget.

    Provided By Dell

  • Webcasts // Jan 2012

    Intel Cloud Builders: HyTrust and Cloud Computing Security

    In this webcast, the presenters describe a comprehensive cloud security solution that addresses security concerns at the base layer and establishes a unified policy by using Intel Trusted Execution Technology.

    Provided By Intel

  • Webcasts // Jan 2012

    Erhardt and Warnell: Protecting More, Securing More, and Saving More

    In this webcast, the presenter explains about Symantec data protection. The presenter also explains about its endpoint and messaging security solutions have helped this small UK property services firm to eliminate 20 minutes each day spent cleaning out spam and cut hours of downtime every month caused by malware.

    Provided By Symantec

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Jan 2012

    How to Improve Your VOIP Sound Quality

    In this Webcast the presenter describes about how to improve their VOIP sound quality. One can get a QoS device installed on their network. One of them is offered by D-link, it's called a DI101. And some firewalls or routers have it incorporated into their device as well so one...

    Provided By Videojug

  • Webcasts // Jan 2012

    Security for VoIP

    In this webcast, the presenter describes about security for VoIP. The presenter also explains about VoIP clipping, VoIP DoS attack, VoIP-related SPIT, caller ID spoofing, VoIP pharming and how viruses used to affect VoIP calls, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Protect a Wireless Connection

    If the user is concerned about hackers tapping into their wireless internet connection, and want to make it as secure as possible, in this Webcast the presenter describing about how to protect a wireless connection.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Choose an Internet Password

    In this Webcast the presenter describes about what is a "password" and how do one can choose that? The presenter also describes that password is that secret code word that one set up, it's an agreement between the user and their host, or email provider, service provider, that this is...

    Provided By Videojug

  • Webcasts // Apr 2011

    Redistricting For Political Gains

    Every decade since 1790, a census of the entire U.S. population is used by state governments to apportion representatives in the U.S. House of Representatives. But the redrawing of congressional districts that follows the census is an exercise in pure politics, says the presenter.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Politics And Process Of Congressional Redistricting

    Now that the 2010 Census is concluded, states will begin the process of reapportionment - re-drawing voting district lines to account for population shifts. A Nonresident Senior Fellow, the presenter, says redistricting has been fraught with controversy and corruption since the nation's early days, when the first "Gerrymandered" district was...

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The History Of The State Of The Union

    Presidential scholar and former White House speech writer the presenter has seen many presidents deliver the State of the Union message, and studied its evolution over the past two centuries. As Washington prepares for President Obama's second such address, the senior fellow emeritus discusses the history of the speech.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Government And Internet Security

    The Internet has expanded communications and commerce in ways unimaginable just a few years ago. But there is a downside: personal information, business records and government materials aren't always secure from hackers and thieves. Venturing into cyberspace isn't completely safe, as Nonresident Fellow the presenter explains.

    Provided By Brookings Institution

  • Webcasts // Dec 2010

    Obama~s Nominees To Federal Judgeships Lag

    The pace of confirmations to the federal bench has slowed in recent years, and President Obama's nominees to the federal district courts and appeals courts have faced considerable partisan resistance. Visiting Fellow the presenter says historically, well-qualified presidential nominees were routinely confirmed to the bench, but that's no longer the...

    Provided By Brookings Institution

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Apr 2009

    The Illegal Drug Trade; Obamas Trip To Turkey; And Cuba

    In this webcast, Latin America Initiative Director, one of the presenters and a panel of experts discuss a new report on the illegal drug trade and organized crime in Latin America; Governance Studies Vice President and Director, the other presenter, takes at look at President Obama's meeting with leaders from...

    Provided By Brookings Institution

  • Webcasts // Mar 2009

    Janet Napolitano On Homeland Security; Jim Steinberg On Foreign Policy; Credit Card Gouging

    In this webcast, a U.S. Homeland Security Secretary, one of the presenters, talks homeland security issues along our northern border; Deputy Secretary of State, the other presenter addresses the foreign policy challenges facing the fledgling Obama administration; and the man of the street sounds off on credit card gouging.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    Partisanship On Capitol Hill

    Brookings takes an in-depth look at the polarizing effects of partisanship on Capitol Hill. Senior Fellow assesses the situation and offers some insight into how this way of doing business will affect the midterm elections.

    Provided By Brookings Institution

  • Webcasts // Feb 2010

    Education And President Obamas Budget

    When President Obama's proposed budget was released, education was declared among the "Winners." In this webcast, the presenter says the proposed spending increases will make reform advocates smile, but could leave state legislators cold about the shift from state to federal funding.

    Provided By Brookings Institution

  • Webcasts // Oct 2009

    Closing Schools For H1N1 Flu; Children At Risk Of Abuse; Iran

    Brookings expert says closing schools to keep kids safe from the flu may come with a big price tag for the economy; scholars and a member of Congress debate the efficacy of home visitation for children at risk of abuse and neglect; and the man on the street discusses nuclear...

    Provided By Brookings Institution

  • Webcasts // May 2010

    The Senate Filibuster

    The founding fathers viewed the Senate as a place where heated rhetoric could cool down, but today the upper chamber is just as fiercely partisan as the House. The presenter describes the origins of the filibuster and why the idea of allowing one Senator to block Senate business has its...

    Provided By Brookings Institution

  • Webcasts // Jan 2010

    PLD: How Will Organizations Benefit?

    When leaders in a single domain gain a broader business foundation, valuable contributions follow.

    Provided By President and Fellows of Harvard College

  • Webcasts // Jan 2009

    Five Ways to Reduce Your IT Audit Burden

    Most organizations spend 30-50% more on compliance than they should. The good news is that compliance can be achieved effectively and efficiently and the attendee of this webcast will learn five key methods to streamline the compliance efforts and reduce the IT audit burden.

    Provided By CXO Media

  • Webcasts // Jan 2009

    Protecting PII: How to Work With IT to Manage Risk

    Privacy professionals must make sure their IT organization is employing responsible privacy practices that will ensure the safety of their company's business-critical data or face significant fines. Understand the critical nature of the test data privacy problem and tips on how to work with IT to implement a test data...

    Provided By CXO Media

  • Webcasts // Jan 2009

    Barracuda Spam & Virus Firewall Introduction

    This webcast will give introduction of Barracuda spam & virus firewall.

    Provided By Barracuda Networks

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva

  • Webcasts // Jan 2011

    User Rights Management for Databases

    In this webcast, the presenters say about User Rights Management for Databases (URMD) enables security, database administrators and audit teams to review rights associated with sensitive data and identify excessive or dormant rights based on organizational context and actual usage. In this webcast, will see how URM is used to...

    Provided By Imperva

  • Webcasts // Jan 2011

    Using Cookie Poisoning to Bypass Security Mechanisms

    In this webcast, the presenters say about cookie poisoning attacks. Cookie poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Webcasts // Apr 2014

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Feb 2010

    Made To Stick: Sparking Curiosity

    Dan Heath, co-author of Made to Stick, speaks with Fast Company about how to get one's ideas across through the power of testable credentials.

    Provided By American Express

  • Webcasts // Dec 2009

    It's Raining Clothes

    A designer who makes some stylish clothes out of discarded umbrellas and gives clients new looks all the time, now gets a makeover of her own.

    Provided By American Express