Skip Links

Network World

Resource Library

  • Six Key Capabilities For Securing Office 365 Email
    Source: Proofpoint Inc
    Webcast: Join Kelley Mak, Forrester analyst, to hear his perspective on the six key capabilities for securing Office 365 email. Gain valuable insights about protecting against advanced threats, improving visibility and forensics, and rapidly reducing the attack surface to better safeguarding your Office 365 email.
  • Next-Gen Now - Outsmarting Ransomware, Rootkits, And Zero-Day Attacks
    Source: Sophos Inc
    Webcast: From ransomware to rootkits, old school security cannot keep pace with today's advanced attacks. Learn why these threats work and how to protect against them.
    Download this on demand webcast and hear how you can get innovative endpoint protection without impacting performance.
    - Prevent: stop the exploits before they hit by thwarting the attack methods of attacks used by advanced persistent threats
    - Detect: use the intelligence of next-generation endpoint and network security to detect and isolate attacks
    - Respond: laser in on critical alerts and address them with contextual security intelligence
  • Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
    Source: EMA
    Webcast: While document and file sharing is increasing rapidly, 97% of organizations cite file sharing as a high risk for information loss, and 75% believe their organization is currently at risk for data loss. Join us to obtain guidance on how organizations can protect themselves from document sharing and e-signature risk while maintaining a high level of collaboration and productivity
  • Will Your Support Strategy Scale for Mobile Apps?
    Source: AetherPal, Inc.
    Webcast: Mobile apps are transforming financial services, field services, health care, retail, and nearly every industry. They enable users to complete business critical tasks at the optimal time and place, such as a point of sale, an accident site, or a patient's home. Modern workers are dependent on apps to perform their jobs and modern businesses are dependent on apps to operate.

    CIO and AetherPal conducted a study of IT decision makers to assess how they were supporting the wave of new apps and the resulting explosion in support requests, how users' expectations are evolving, and how enterprises are adapting their support strategies.

    Join this webinar to learn how these trends are affecting other enterprises and the tools available to address these growing requirements.
  • LIVE EVENT: Thurs, July 21st. 2-3 pm ET--Using Catchpoint for Better End-User Experience Monitoring
    Source: CatchPoint Systems Inc
    Webcast: As online traffic increases across channels, delivering an amazing end user experience is becoming more and more important, as companies who don't will soon find their customers flocking to their competitors. To pull this off, you need to have the right performance analytics tool to suit your needs.

    In this latest installment of OpsCast Spotlight, Using Catchpoint for Better End-User Experience Monitoring, the IT leadership team at eBags will explain why they decided to switch to Catchpoint for their performance analytics needs, and how their end-user monitoring and customer experience have improved as a result.
  • The Imposter in the Machine
    Source: Proofpoint Inc
    Webcast: Advanced threats are shifting once again. Impostor emails, otherwise known as business email compromise (BEC) or CEO fraud, are purpose-built to impersonate executives and trick you into sending money, or personal information to cybercriminals. Learn how Proofpoint employs our dynamic classifier and quarantine functionality to allow you to quickly see, report and stop this attack technique.
  • Six Key Capabilities For Securing Office 365 Email
    Source: Proofpoint Inc
    Webcast: Join Kelley Mak, Forrester analyst, to hear his perspective on the six key capabilities for securing Office 365 email. Gain valuable insights about protecting against advanced threats, improving visibility and forensics, and rapidly reducing the attack surface to better safeguarding your Office 365 email.
  • Application Performance Management in the Digital Economy
    Source: EMA
    Webcast: Date / Time: Thursday, July 14th @ 1 PM Pacific / 4 PM Eastern

    The latest research on application performance management (APM) from leading IT analyst firm Enterprise Management Associates (EMA) is a deep dive into the trends and requirements driving investments in APM solutions and the outcomes companies experience when such solutions are put in place.
  • 10 Rules to Minimize Network Outages
    Source: NetBrain Technologies
    Webcast: When the network goes down, every minute counts. Network outages cost enterprises $1.7B in lost revenue last year, and much of it could have been avoided. So what can you do to shorten, or even avoid, network outages altogether? Join our panel of network experts for this educational webcast where we'll reveal 10 rules to minimize both the time and likelihood of a network outage. We'll leverage NetBrain's map-driven automation software to showcase one solution for implementing these 10 rules.

    Watch this one hour webcast to discover:
    * The top causes of network outages
    * Five rules to shorten a network outage
    * Five rules to avoid network outages
    * A troubleshooting use case from the world's second largest financial information provider
  • Data Warehousing and Analytics In the Cloud: Understanding The Options
    Source: EMA
    Webcast: Many organizations are either leveraging or evaluating data warehousing and analytics in the cloud as part of a broader information management strategy. Making the right cloud implementation choices require due diligence on the part of project stakeholders and an understanding of what market options exist. Join us to understand your options!
  • On-Demand Webcast: What Do Your Top 5 Cyber Security Threats Have in Common?
    Source: RES Software
    Webcast: Cybercriminals have figured out how to monetize their malicious actions and they're going after the opportunity with ferocity, targeting individuals and corporations alike. The future of ransomware alone is terrifying. Take a look at what Intel's McAfee Labs predicts over the next five years. They number the at-risk users, connections and devices - including wearable devices - in the billions.

    Ransomware is only one of the cyber security threats IT needs to watch out for. In this webinar, we'll explore the top 5 cyber security threats and how to avoid them. Can you guess what they have in common?
  • Ask the Analyst: Key Elements of an Effective Security Program
    Source: AlienVault
    Webcast: Date: Tuesday, June 28, 2016, 03:00 PM EDT

    The goal of a well-developed security program is to ensure that your team has the data, tools, expertise and processes needed to detect and respond quickly in the event of a threat. So, what are the critical elements of an effective security monitoring program? Join us for an engaging 30-minute discussion where AlienVault CEO Barmak Meftah will interview guest speaker Forrester Security Analyst Joseph Blankenship on how organizations should assess their security program, validate the effectiveness of security monitoring tools, and plan for the future. This session will also provide a unique opportunity to ask the analyst your questions.

    Featured Speakers:

    Joseph Blankenship - Senior Analyst, Forrester

    Barmak Meftah - CEO, AlienVault


    Moderator: Barbara R. Call - Digital Content Director, IDG Strategic Marketing Services
  • How to Achieve Lower Total Cost of Ownership with your Voice
    Source: Level 3 Communications
    Webcast: Trimming costs by eliminating underutilized ISDN-PRI circuits at every office site is the easiest measurement of gained cost/efficiency when an enterprise moves from legacy services to UC&C solutions. But this is really the low-hanging fruit of the transition and doesn't capture medium to longer term savings and gained operational efficiencies that help drive growth. Focus on defined area of true TCO that an IT/Voice Architect, or Procurement VP should evaluate and discuss with potential network service providers.
  • Gamification of a Fortune 20 SOC
    Source: Hewlett Packard Enterprise
    Webcast: Many Security Operations Centers (SOCs) struggle in 3 key areas when it comes to personnel: continuous training, extending retention and measuring effective KPIs. In this talk Marcel Hoffmann and Josh Stevens introduce the combination of gamification, user experience and machine learning as a concept to address these 3 challenges.
  • SIEM is dead. Long Live the SIEM!
    Source: Hewlett Packard Enterprise
    Webcast: SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

    We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn't a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.

Results 1 - 15 of 148