Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • Webcasts // Jan 2011

    The Register Webcast - Thinking about moving to service delivery?

    Thinking about moving to service delivery? Published: 1 Jan 2011 For years, most organizations have been managing the components of IT, with a primary focus on the performance and availability of specific assets. Those who think deeply on such things, however, reckon it's all changing. In the future, it's...

    Provided By CA

  • Webcasts // Apr 2012

    Optimize Your Data Center with SPARC and Solaris 11

    More capacity, higher availability, greater security, lower costs - the demands being placed on IT are growing every day. Can your servers and operating systems keep up with these demands? Or do legacy systems add complexity, impede performance and drain resources? Watch our new Webcast to see how Oracle's Solaris...

    Provided By Oracle

  • Webcasts // Sep 2009

    Veritas Storage Foundation for Sybase ASE Cluster Edition

    Sybase and Symantec are working together to optimize Sybase's Virtualized Resource Management? technology framework found in ASE Cluster Edition for Veritas Storage Foundation HA. The new solution delivers a truly integrated database and storage clustering solution providing administrative efficiency, higher availability and improved performance. Learn more in an on demand...

    Provided By Sybase

  • Webcasts // Sep 2009

    Database Virtualization Using Clusters: Cheaper, Easier, Faster, Better

    Learn how a virtualization approach that is built into the database can create deployment flexibility for better service levels, shift workloads for less downtime, and free-up valuable DBA resources to focus on high-value activities. Guest speakers: Carl Olofson, Research Vice President for IDC Peter Thawley, Senior Director...

    Provided By Sybase

  • Webcasts // Jan 2010

    NFS Client Fundamentals: Understanding Authentication

    Does one know that he or she can access UNIX files, in Microsoft machines? Yes, this is possible with Open Text NFS. Wondering what is Open Text NFS. One can watch the 40 minutes video presentation by Jeremy Dodds, Product Specialist, and Connectivity Customer Support. He says that it is...

    Provided By Open Text

  • Webcasts // Jan 2010

    Secure Exceed with Open Text Secure Shell

    Several institutions consider the provision of security to their valuable database as an important function among the routine functioning of their enterprise. This is even more significant when it comes to the securing of their vital information relating to their mission. The institutions make effort in assessing and enhancing their...

    Provided By Open Text

  • Webcasts // Feb 2013

    The I.T. Factor - SaaS: Making Good Cloud Decisions

    Cloud computing is still in its relative infancy in terms of user and enterprise adoption, but it already has an effect on how global business is conducted. Data storage, digital collaboration, software- and platform-as-a-service, and virtualization are among the many tools that have benefited from and/or originated because of cloud...

    Provided By TechRepublic

  • Webcasts // Mar 2013

    On-demand Webcast - Mobile Data Security: Why the Industry Must Improve - Or Else

    More than 1.2 billion smartphones will enter the market over the next five years, according to ABIResearch. This influx of mobile devices will forever change how business information is disseminated and stored. According to projections from an Enterasys survey, three out of four individuals believe their enterprise will implement BYOD...

    Provided By TechRepublic

  • Webcasts // Jun 2010

    Cloud Based Security Services: Saving Cloud Computing Users from Evil-Doers

    Join Akamai and a panel of leading specialists for a discussion that delves into IT's current and future security threats. Topics include web application security, vulnerabilities, threats and mitigation/defense strategies, and tactics. Get real-life experiences on the escalating requirements for Internet security from Cisco, Whitehat, and Akamai. We will discuss...

    Provided By Akamai Technologies

  • Webcasts // Jan 2010

    Controlling Malware With Security Analytics

    In today's business world, partners, customers, networks, applications, computers and mobile devices must all be connected through many points of access, making enterprises vulnerable to hackers. The presenter of this webcast talks about how system breaches can damage clients' businesses and cost them money, and advanced security analytics that give...

    Provided By Unisys

  • Webcasts // Oct 2010

    Protecting Sensitive Data in an Enterprise With No Boundaries

    Email was once a nice-to-have application, as was running a corporate website. Now both are critical to enterprises, with millions at stake if they experience an outage. With this in mind, it's impossible to ignore the rapid adoption of mobile devices, social networks, IM, texting and other alternate communications, and...

    Provided By Unisys

  • Webcasts // Jan 2010

    Security and the Importance of Integration: You Are Only as Strong as Your Weakest Link

    One can stay only as secure as the weakest link and getting security right has become increasingly complex. This webinar explores the issues of how getting security right will deliver the real business benefits, be it through increased trust delivering more client/citizen engagement, reducing costs, or having the freedom to...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath MCP 13.0 Security Overview

    The Unisys ClearPath MCP 13.0 Release includes many important security features, such as Secure Telnet, 2-tier secure WebEnabler, and secure TCPIPNATIVESERVICE port files, a new Role-Based Access Control subsystem for applications, Locum Real-time Monitor for real-time security monitoring, and many other incremental features. This technical webcast gives an overview of...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath OS 2200 Encryption Insights

    Encrypting sensitive data is an essential part of a strategy for protecting business assets and complying with governmental and industry regulations. This technical webcast includes insights gained from the use of Cipher API, the ClearPath OS 2200 product that uses to encrypt the stored data. After a brief overview, this...

    Provided By Unisys

  • Webcasts // Nov 2010

    What the Unisys Security Index Means for You

    National security, identity theft and credit card fraud are the top security concerns of the American public. These findings are the latest results of the, a biannual survey of America's sense of financial, national, Internet and personal security. So what do these results mean? What steps are Americans taking to...

    Provided By Unisys

  • Webcasts // Jan 2010

    Understanding the Value of MPLS Encryption

    This webinar will cover a complete and brief introduction to MPLS, The advantages of moving to MPLS services, the security implications. This webinar will introduce MPLS and underscore its increased acceptance and popularity based on maximization of data transport resources and reduced cost enabling a strong return on investment. Based...

    Provided By THALES

  • Webcasts // Mar 2009

    Webinar: People, Process & Policy: Developing an Effective Identity & Access Assurance Strategy

    The presenters of this webcast explain how to develop an effective strategy to assure that only the right people have access to the right information and resources and are doing the right things. It will explore how an access assurance strategy, which includes various technologies including provisioning, compliance management, authorization,...

    Provided By Courion

  • Webcasts // Feb 2009

    Webinar: Reducing Risk in Sharepoint Enviornments

    Microsoft SharePoint is powerful, flexible and easy to implement collaboration tool, but with its limited security and governance model, the ease and convenience of SharePoint can create a security nightmare, especially if sensitive data winds up on the wrong site. The attendee will learn how one can identify and reduce...

    Provided By Courion

  • Webcasts // Feb 2009

    Webinar: The Role of Roles in Access Assurance

    Access Assurance is a holistic approach for managing credentials that ensures that the right people have access to the right resources and are doing the right things in the enterprise. This is critical in today's environment of changing job responsibilities due to mergers, acquisitions and reductions in force. This webcast...

    Provided By Courion

  • Webcasts // Jul 2009

    The Spread of Web-Based Malware and New Defenses

    Web sites and web pages have become the new frontier for malware distribution. Over the past two years, there has been a fundamental shift in how malware is distributed - while teenagers used to write viruses which required users to click on email attachments to propagate, financially motivated cybercriminals now...

    Provided By Stanford University

  • Webcasts // Jan 2010

    David Parsley On Big Macs And The World Economy

    Professor Parsley's current research focuses on exchange rates and the integration of goods and services markets, financial markets, and labor markets. He is also working on measuring the effects of political connections on the quality of accounting information, and on the financial performance of politically connected firms.

    Provided By Vanderbilt University (Owen)

  • Webcasts // Jan 2010

    Increase Sales Performance and Enhance Customer Service

    This webcast by Cisco offers information regarding their Cisco In-Store Digital Media solution through which one can attract as well as retain a customer-focused sales force. This In-Store Digital Media solution offers various solutions which include training videos, educational information, human resources announcements and product information. This suit of Cisco...

    Provided By Cisco Systems

  • Webcasts // Oct 2009

    Securing Architectures and Applications for Network Convergence

    Manufacturers today can make smart decision at the same time make better business because the manufacturers are able to access to manufacturing data through the advanced convergence of both manufacturing, and enterprise networks which has offered them. This has provided the manufacturers, the competitive edge than the rest. What ever...

    Provided By Cisco Systems

  • Webcasts // Mar 2013

    On-demand Webcast: Affordable and Secure Data Storage for the Mid-Market

    Storing and managing data doesn't have to be exclusive to the Fortune 500. The ability to effectively gather and archive data is as important to the mid-market as it is to the largest organization. In fact, finding the right mix of technology and strategy can help to dramatically reduce costs,...

    Provided By EMC

  • Webcasts // Apr 2012

    Cisco Unified CallManager and IP Phone Security

    In this webcast, the presenter going to focus on CUCM fundamentals & implementation, review of the security by default feature introduced in CUCM 8.x, upgrading CUCM 7.x to 8.x, & the rollback method from CUCM 8.x to 7.x.

    Provided By Cisco Systems

  • Webcasts // Mar 2009

    The Meaning of the "v" in Intel vPro Technology

    The presenter explains what the "v" in Intel vPro Technology means.

    Provided By Intel

  • Webcasts // Feb 2009

    Intel CIO on the Nature of Security Threats

    The presenters throw light on nature of security threats.

    Provided By Intel

  • Webcasts // Feb 2009

    War Gaming: CXO Interviews Intel's Senior InfoSec Manager

    The presenter explains how Intel employees pretend to be the bad guys in exercises that help Intel IT discover security vulnerabilities.

    Provided By Intel

  • Webcasts // Aug 2008

    Using War Games to Find IT Vulnerabilities

    The presenter describes how Intel uses war games to find IT vulnerabilities.

    Provided By Intel

  • Webcasts // Jan 2010

    Webcast: Securing Your Web Applications

    As more application traffic moves to the web, the information assets are facing new security threats. Web application security is a comprehensive, policy-based method designed to help manage these emerging threats at the application level, so one can prevent attacks that no other firewalls can address. The attendee of this...

    Provided By F5 Networks

  • Webcasts // Jul 2010

    Why ISIS? - Understanding the Value

    ISIS (Image and Scanner Interface Specification) is an industry standard that enables one to easily integrate document imaging into the solution offerings. This on-demand webcast gives an introduction to ISIS. Learn how ISIS can help a person quickly develop imaging applications and bring them to market - giving them a...

    Provided By EMC

  • Webcasts // Jan 2010

    Simplify Backup & Recovery for SAP on z/OS

    SAP administrators face complex challenges with backup and recovery operations. The attendee of this webcast will learn how Rocket Software's "Storage-aware" database products integrate with EMC storage systems to provide backup and recovery solutions for SAP.

    Provided By EMC

  • Webcasts // Jan 2010

    Why Captiva Over the Competition?

    EMC Captiva InputAccel is about to become easier to use than ever - for any document, anywhere, anytime. The attendee of this webcast will learn more about the simplified design and development capabilities of the upcoming InputAccel CaptureFlow Designer.

    Provided By EMC

  • Webcasts // Jan 2010

    Simplify SAP Administration on z/OS

    SAP administrators often face complex management and business continuity challenges. The attendee of this webcast will learn how EMC software can simplify the management of the SAP environment, while ensuring business continuity and high availability.

    Provided By EMC

  • Webcasts // Dec 2009

    Removing Paper From Critical Business Processes

    Do paper documents and forms slowing down the critical business transactions? The attendee of this webcast will find out how organizations are using intelligent capture to transform paper into business-ready electronic content - instantly removing processing delays and security concerns. Explore the benefits of automating document-driven processes and connecting critical...

    Provided By EMC

  • Webcasts // Dec 2009

    New Ways to Improve Recoverability of Symmetrix or CLARiiON Environments

    To ensure continuous operations and data recoverability, replication is critical. The attendee will learn new ways to improve data protection with Data Protection Advisor's replication analysis capabilities for SRDF, TimeFinder, MirrorView and SnapView. More effectively manage the disaster recovery and business continuity SLAs.

    Provided By EMC

  • Webcasts // Feb 2010

    Data Protection in a New Decade

    The latest release of EMC NetWorker offers significant enhancements that simplify backup operations; more effectively protect heterogeneous environments, virtual servers, and applications; and lower overall cost of ownership. The attendee of this webcast will find out how NetWorker continues to evolve to meet the backup and recovery needs. The attendee...

    Provided By EMC

  • Webcasts // Mar 2010

    Virtualize Mainframe Backup to Ensure Business Resiliency

    Mainframe data protection is NOT the same as it's always been - new technologies make it easier than ever to back up the data. By leveraging EMC Symmetrix storage, TimeFinder replication, Data Domain deduplication, and INNOVATION Data Processing business resiliency solutions, one can protect the data and still, meet the...

    Provided By EMC

  • Webcasts // Mar 2010

    Securing VMware Desktop and Server Environments With RSA

    The attendee will learn more about security considerations in a virtual IT environment, and get a detailed look at specific RSA solutions that help mitigate risk and meet compliance requirements. This webcast webcast will help to understand how to identify the security risk in a virtual IT environment.

    Provided By EMC