Skip Links

Network World

Resource Library

  • How to Secure Your Big Data Environment
    Source: Cloudera | Imperva
    Webcast: A 2014 Poneman Institute study found that 43% of companies said they experienced a data breach in the last two years. With the amount of data constantly expanding, how can IT leaders secure their big data environments? Join the experts as they discuss how you can have a strategy for your data that keeps it secure and compliant while giving examples of companies that have already done this successfully.
  • 9 Noble Truths of Network, Server and Application Monitoring
    Source: Ipswitch
    Webcast: Nearly every organization is highly dependent on the reliability, availability and performance of its IP networks, physical and virtual servers and IT applications. This connected web of IT infrastructure, software, virtual and mobile technology is the backbone of business across almost every industry.

    Register for this Live Webcast on Feb. 25 at 2 PM EST to learn how IT teams can meet the need to thrive while dealing with an increasingly large and complex environment. The nine noble truths of network, server and application monitoring explain the problem and describe the path to its solution.
  • Breaking the Kill Chain
    Source: Fortinet
    Webcast: Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors, known as the Kill Chain. In this webcast subject matter experts discuss, in technical detail, 1) the current trends and the latest information on the global cybercrime eco-system 2) all the different elements that make up the "Kill Chain" 3) protective steps that forward-thinking companies are taking to break the kill chain to minimize the chances of a data breach.
  • What Does Customer Experience Mean for Your Social Business?
    Source: IBM
    Webcast: Respond promptly to customer needs. Make sure customer interactions are extremely tailored. Provide the right information to the right place at the right time. These are all the actions businesses must take to deliver a seamless customer experience. However, one person can't do it. It is even too much for one department.

    Join our panel and us on this webinar to learn how to:

    - Understand each customer's specific situation
    - Deliver personally relevant and rewarding experiences
    - Find the moment customers browse, buy, or abandon a transaction
    - Identify real-time trends based on internal and external customer data
    - Co-create authentic brand experiences with customers, employees, and partners
  • The Mobile Experience - Increase Your Competitive Advantage
    Source: IBM
    Webcast: Download this half hour webinar to learn how to increase your competitive advantage using the latest in mobile technology design and trends. Best practices expert, Bill Loller, VP Mobile at IBM, will review what's wrong with the mobile customer experience today and what can be done to improve that experience.
  • Mobile Security Video
    Source: CDW
    Webcast: CDW's solution architect Ziyad Roumaya expands on the security threats introduced by a growing mobile workforce and the "Bring your own Device" (BYOD) trend; and provides tips for addressing those issues, including creating internal policies and employing a Mobile Device Management (MDM) solution.
  • Achieving Complete Security: Endpoint, Mobile, and NAC
    Source: CDW
    Webcast: Is sensitive data leaking out of your business? For many enterprises, mobility is the enemy of security. As more devices and platforms enter the workplace, security strategy must be constantly refined to ensure the safety of data and users.
  • Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage
    Source: IBM Corporation
    Webcast: Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

    Attend this webcast and hear how you can:
    -Lower data management costs through policy driven automation and tiered storage management
    -Manage and increase storage agility through software defined storage
    -Remove data related bottlenecks to deliver application performance

    IBM Software Defined Storage, code named Elastic Storage, is based on IBM General Parallel File System (GPFS) technology, and is a proven, scalable, high-performance data and file management solution. Elastic Storage is used extensively in many industries worldwide, provides simplified data management and integrated information lifecycle tools. IBM's Elastic Storage allow you to manage petabytes of data and billions of files, controlling the growing cost of increasing amounts of data.

    Nuance Communications, Inc. is a leading provider of voice and language solutions for businesses and consumers around the world. Its technologies, applications and services make the user experience more compelling by transforming the way people interact with devices and systems. Every day, millions of users and thousands of businesses use Nuance's proven applications. Nuance R&D has a large worldwide user community who interacts with big data every day. Multiple petabytes of storage are managed with IBM Elastic Storage (GPFS).
  • Why Your Virtualization Matters
    Source: IBM Corporation
    Webcast: Over 61,000 virtualization customers have weighed in. Join the webcast and hear how other companies like yours are using virtualization to their benefit.

    In today's marketplace there are many choices for virtualization that profess to offer efficiency, simplicity of management, and security -but do they all offer the same levels? And how about IT staff load, project deployment times, risk, agility, and other key items?

    Solitaire Interglobal Ltd. (SIL) has conducted surveys and will report on their conclusions as to the advantages and disadvantages of various virtualization solutions on this webcast.

    Join us to learn which virtualization solution offers the highest security, lowest risk, best workload density, and highest executive satisfaction.
  • Enterprise Mobility Management Solutions for IT
    Source: MobileIron
    Webcast: This video illustrates how end-users are rapidly adopting mobile technology, and coming to work with heightened expectations around mobility. This Mobile IT transformation presents unique challenges for the IT organization. As consumer devices gain acceptance in the enterprise, IT needs a new generation of enterprise mobility management solutions to secure and manage mobile devices.
  • Unclogging the Network Bottleneck
    Source: CDW
    Webcast: Software-defined networking is one of the hottest buzzwords of 2014, but saying exactly what SDN is can be a challenge.

    Technologist Deepak Munjal explains how Software Defined Networks (SDNs) deliver performance in this HP and CDW sponsored webinar.
  • Breaking the Kill Chain
    Source: Fortinet
    Webcast: Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors, known as the Kill Chain. In this webcast subject matter experts discuss, in technical detail, 1) the current trends and the latest information on the global cybercrime eco-system 2) all the different elements that make up the "Kill Chain" 3) protective steps that forward-thinking companies are taking to break the kill chain to minimize the chances of a data breach.
  • Bringing software licenses into compliance
    Source: CDW
    Webcast: A hospital group received a software license audit, so they called in CDW to help define and manage their software licensing status.
  • Getting Security Right with Office 365 and All of Your Other Cloud Apps: Lessons Learned from A Real-World Case Study
    Source: Skyfence Networks
    Webcast: Whether you've already deployed Office 365 or have plans to, security considerations around moving your business-critical apps to the cloud are paramount. From Exchange, Yammer, and SharePoint to OneDrive and the Administrator Portal, monitoring activity and securing access is critical to mitigating threats and protecting confidential data.

    Join our experienced experts to learn strategies for dealing with the growing challenge of GAINING VISIBILITY, CONTROLLING AND SECURING all OFFICE 365 usage, and to proactively respond to suspicious and anomalous activity that could indicate a threat to your organization and confidential data. We'll discuss:
    * Office 365 access control issues and their impact for employees, mobile workers and contractors
    * Discuss strategies for deploying cloud-based security that doesn't negatively impact your users
    * Hear about a customer implementation on the challenges they faced and how they solved their Office 365 security concerns
    * How account-centric attacks target valid user credentials of cloud apps
    * How cloud apps beyond Office 365 can create a blind spot for IT and approaches to gain comprehensive visibility
  • Dell Engineered Solution for VMware EVO: RAIL
    Source: Dell Inc.
    Webcast: The Dell Engineered Solution for VMware EVO:RAIL is an integrated hardware and software appliance platform designed to accelerate deployment of a virtual infrastructure. The hyper-converged appliance provides simplified infrastructure management and rapid delivery of workloads. Now you can go from power-on to deploying VMs in just 15 minutes with the full feature set of VMware vSphere and vCenter, and the trusted hardware platform of Dell.

Results 1 - 15 of 55