Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2014

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    PCIDSS and Secure Applications

    The Payment Card Industry Data Security Standard (PCI DSS) applies to whether cardholder data is stored, processed or transmitted. In this webcast, the presenter will examine the best practices in development of bespoke or custom written applications to be used within the cardholder data environment of the PCI DSS to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Novell Cloud Security Service

    In this webcast, the presenter going to show the users' how they can harness the technology of the future with Novell Cloud Security Service. The presenter also going to explain about how service providers can manage multi-tenant SaaS infrastructures.

    Provided By Novell

  • Webcasts // Jan 2014

    Identity and Security Services Video

    In this webcast, the presenter gives an overview of Novell services for identity and security. The presenter also explains about different identity strategy, web access management, security audit, identity management deployment and password management.

    Provided By Novell

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Provided By Workday

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Oct 2013

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Oct 2013

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Sep 2013

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware

  • Webcasts // Sep 2013

    Moving to Microsoft Exchange 2013?

    Are you ready to make the move to Exchange 2013 and enjoy its new, powerful features? In this archived webcast, see if your company is ready for this important migration and the steps to take for it to be a success. Watch it today.

    Provided By Dell Software

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel