Skip Links

Network World

Resource Library

  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • How to Protect Enterprise Data Yet Enable Secure Access for End Users
    Source: Code42
    Webcast: Watch this on-demand webinar to learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and immediate steps for better protecting enterprise data while providing end users with secure data access.
  • Mobile Security: Containerizing Enterprise Data
    Source: Code42
    Webcast: Enterprise mobility presents many exciting opportunities for the business, but it can also create a new set of competing requirements within the organization. Mobilizing an entire workforce introduces significant risk to the enterprise; before any technology is implemented, organizations must review corporate requirements and respond with the appropriate security measures.

    Enterprise IT teams exploring the realm of mobile device management (MDM) must first determine the best way to ensure security and compliance of corporate data while giving users the flexibility to work how and where they want. But which data and apps need to be protected, and what type of security should be added?

    In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM, and how the containerization of data can help your organization "bring-work-to-devices" (BWTD) in the most secure and compliant manner.
  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • Tales from the Trenches - Industry Risks and Examples of DDoS
    Source: Neustar Inc.
    Webcast: Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.
  • Ecommerce Site Needs Protection Against Cyber 'Pirate'
    Source: Neustar Inc.
    Webcast: Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.
  • Delivering Events of Olympic Proportions
    Source: Akamai Technologies, Inc.
    Webcast: In this webinar, Eric Black, VP of Technology, NBC Sports & Olympics; Greg Ireland, Research Manager for Multiscreen Video, IDC; and Bill Wheaton, SVP & GM, Media Division, Akamai, discuss:
    - How to deliver quality, complex video at scale
    - Methods for mitigating security risks present in high profile events
    - Best practices for partnering with vendors to integrate across technology platforms
  • Step Up to the IT Security Challenge
    Source: Kaspersky
    Webcast: Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.
  • Vblock™ Specialized System for SAP HANA®
    Source: VCE
    Webcast: Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. The combination ensures SAP HANA® is deployed into production with the trusted predictable performance, one-stop customer support, and security that are consistently delivered across the entire Vblock Systems family and unmatched in the industry.
  • Regain Control Over Access
    Source: McAfee
    Webcast: Is your access infrastructure too complicated with too many products requiring different ways to access information? Do you have multiple types of internal and external users needing access with special access requirements? Can you control a user's access, based on where they are, their device type or device status? Do you currently use (or wish to use) any cloud applications but aren't happy with the security model and access not being under your control? Are you concerned about user-owned mobile device (BYOD) security? Do your users have too many different credentials for different applications? Is all this costing you too much time and money?

    If these questions sound familiar, join identity and security experts from McAfee and Portsys to find out how you can provide your users access to any device and any application from any location.
  • Why Are Customers Really Deploying an NGFW?
    Source: Fortinet
    Webcast: Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
  • What should I look for in a Next Generation Firewall? SANS Provides Guidance
    Source: Fortinet
    Webcast: With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions.
  • Modular Security For Todays Cyber Threats and Cloud-Based Data Centers
    Source: HP
    Webcast: Network security is not just about eliminating bad traffic, it is also about making sure applications and critical data are always available to the right audience at the right time. The right network security architecture can provide security for physical assets, but also extend protection for virtual and cloud computing infrastructures without impacting performance. In fact, unlike in the past, a network security product should never be considered a bottleneck due to deep packet inspection, but should actually be capable of improving bandwidth and performance.
  • Fast, Secure, Cost-Effective: How to Protect Tomorrow's Data Center Network
    Source: Fortinet
    Webcast: Data center networks, whether conventional or in the cloud, must handle ever-larger quantities of data. And those networks must provide access--securely--to an ever-broadening array of mobile devices. In this on-demand Webcast, you will learn how advanced firewall technology can enable you to meet these demands while keeping costs under control.
  • Streamline Software Asset Management, Compose a software Management Symphony
    Source: CDW
    Webcast: Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel to learn more about:

    - Software contracts and strategy
    - Software licensing
    - Compliance

Results 1 - 15 of 16