Skip Links

Network World

Resource Library

  • Partners Earn 30% Margins on Collaboration Sales
    Source: CDW
    Webcast: Projected to spend $50 billion annually, the midmarket represents a large and untapped opportunity. Midmarket organizations with limited IT resources have a need for a complete collaboration solution that is simple to deploy, manage and maintain. This video highlights Avaya's advanced product features at an affordable price and makes the compelling case for the award-winning Avaya partner program with its high partner margins averaging 30%.
  • How to Deliver Effective Information Governance with Data Lineage
    Source: IBM
    Webcast: This webcast will highlight how organizations using the IBM Information Governance Catalog can extend the content of the catalog by using the new Open Catalog and Lineage framework. Extending the catalog via this framework helps organizations catalog and govern their Data Lake implementations and supports all manner of data storage and data integration technologies including MapReduce.

    This webcast will provide viewers with:

    -A clear overview of the IBM Information Governance Catalog and its ability to support and implement Data Governance requirements
    -A synopsis of the challenges faced by organizations trying to implement Data Governance and what are the best practices that they could follow
    -A brief education on Data Lineage and how does IBM Information Server support it
    -An example of how Information Governance Catalog is helping customers in the real world
  • Adaptive Security - Sharing Threat Intelligence Across the Enterprise
    Source: CDW
    Webcast: Security breaches have risen by 48% in the last year according to the IDG CSO State of Security report. The center for Strategic and International studies pegs the cost of these breaches between $375 and $575 billion! This webcast focuses on updating your security posture. CDW's experts, working with McAfee, now a part of Intel Security provide a new approach enabling organizations to effectively block threats, identify compromises, and expedite remediation to securely enable a safe and connected world using Adaptive Threat Protection.
  • Conquering Costs
    Source: CDW
    Webcast: Saving money on software licensing is no longer enough; smart organizations are focusing on software TCO and generating new benefits from this approach. This webcast gives you the details on the next generation best practices contained within CDW's Software License Management practice. This modern approach leverages the cloud for new capabilities that will delight end users and your management as well!
  • What iBeacons Mean for Your Existing Wireless Network and Your Business
    Source: Aerohive
    Webcast: You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business".
  • Gigabit Speed Wireless Networks with 802.11ac
    Source: Aerohive
    Webcast: With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans.
  • Understanding the Network Impact of 802.11ac
    Source: Aerohive
    Webcast: Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment.
  • Transforming Your Mobile Device into a Trusted Digital Identity
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • Mobile Authentication: A Simply Better User Experience
    Source: Entrust, Inc.
    Webcast: Take the hassle out of your security by simplifying your approach to authentication. Learn how to leverage mobile and mobile smart credentials, so you can transform your authentication platform, reduce headaches for your users and minimize costs.
  • A Guide to Mobile Enterprise Authentication
    Source: Entrust, Inc.
    Webcast: Learn how mobile maximizes your security, simplifies your approach to authentication and minimizes your costs - ultimately improving your user's experiences all by putting the security tools they need, on the device they love.
  • Exploring the Possibilities of Mobile and Security in the Digital Age
    Source: Entrust, Inc.
    Webcast: Explore mobile identities, mobile security and the ways mobile can transform and grow your business. Entrust Datacard's Mike Byrnes covers the position of mobile and mobile identities in the enterprise.
    Key Benefits:
    - Why Mobile Identities? - Understand what mobile identities are and discuss their benefits and impact on security.
    - Mobile Identities in Action - Delve into use cases on different ways mobile identities integrate with enterprises.
  • Box for Healthcare
    Source: Box
    Webcast: Learn how Box makes it easy for Healthcare and Life Sciences organizations to securely share content and collaborate across the healthcare continuum to better collaborate, share data, research and improve care delivery. Box supports HIPAA and HITECH compliance and signs HIPAA Business Associate Agreements with its customers.
  • AstraZeneca Employees use Box to Drive Change Through Innovation
    Source: Box
    Webcast: AstraZeneca, a global, innovation-driven biopharmaceutical business, has made Box's cloud content sharing and collaboration platform available to its 51,000 employees across more than 100 countries. AstraZeneca chose Box to power secure collaboration company-wide and with external parties, as well as to enable mobile access to information. Listen to David Smoley, Chief Information Officer, AstraZeneca discuss how Box secure file sharing, content management and collaboration has enabled the company to reinforce its cloud strategy.
  • Eliminating Shadow IT in Hospitals
    Source: Box
    Webcast: Shadow IT is hardware or software that is being used by employees within an enterprise that is not supported or approved for use by the organization's IT department.
  • Mobile Productivity and HIPAA, Together at Last
    Source: Box
    Webcast: Providence Anesthesiology Associates uses Box to streamline patient care to over 100,000 patients each year across 19 locations. They securely share Protected Health Information (PHI) in Box while staying HIPAA compliant and leveraging a mobile friendly platform for physicians to consume documents on their smart phones and tablets.

Results 1 - 15 of 76