Skip Links

Network World

Resource Library

  • Live Webcast 7/12/16: Automating the Identity Lifecycle with Okta Provisioning
    Source: Okta
    Webcast: Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth.

    In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI.

    We look forward to you joining us for the live event!
  • IDC and Riverbed Webcast: Experience the Future of Networking with SD-WAN
    Source: Riverbed Technology
    Webcast: Traditional approaches to networking are failing in today's hybrid era of IT. View this webcast to learn why as Brad Casemore, Research Director at IDC, joins leaders from Riverbed Technology to explore the drivers for modernizing legacy network architectures. See why SD-WAN is redefining the future of networking, and get an in-depth preview of Riverbed's strategy to enable fast, agile, and secure application delivery in a cloud-centric world.
  • Using Skype for Business? Is it Time to Re-Think Your Infrastructure
    Source: Citrix Systems
    Webcast: In this webinar Skype for Business MVP Alex Lewis and Citrix expert Derek Yee discuss common deployment considerations and how to better monitor and enhance Skype for Business performance through a load balancer.
  • Protect Your Business From Ransomware
    Source: Kaspersky Lab
    Webcast: Cybercriminals raked in an average of $24 million in 2015 from reported Ransomware attacks. It's a growing market with lots of opportunity that shows no signs of slowing down. Find out how you can protect your company from this rapidly growing threat.
  • NSA Director Addresses Cyber Risk Board Forum Attendees
    Source: NYSE Governance Services
    Webcast: Watch NSA Director Admiral Michael S. Rogers discuss the current cyber environment, challenges, and opportunities between the public and private sectors.
  • Jumpstart HITRUST CSF Certification with a Proven Methodology
    Source: Coalfire
    Webcast: Have you received a letter requiring you to be HITRUST CSF certified or are you considering HITRUST as a way to manage compliance regulations? Learn about the HITRUST CSF assessment process, the importance of a proven assessment methodology, and how to avoid common pitfalls that can increase costs.
  • Medical Device Security: How to Protect Data in a Connected World
    Source: Coalfire
    Webcast: Learn what medical device manufacturers are doing, or not doing, to embed security into devices and find out about best practices that healthcare providers can implement to increase data security. Learn how to apply FDA guidance and engage industry working groups related to medical device security.
  • Automating Open Source Security In Apps And Containers
    Source: Black Duck Software, Inc.
    Webcast: Security Vilnerabilities? How do you know and where to check?
  • Accelerate CI/CD with PaaS and containers
    Source: Red Hat
    Webcast: Platform-as-a-Service (PaaS) technology provides a critical framework for the kind of automation that makes real DevOps transformation happen. Learn how.
  • Enterprise-Ready Web-Scale Container Application Platform
    Source: Red Hat
    Webcast: Based on Docker formatted Linux containers, Kubernetes orchestration and Red Hat Enterprise Linux 7, Red Hat provides full support from the operating system to application runtimes.
  • Revolutionizing Application Delivery with Containers
    Source: Red Hat
    Webcast: Advancements in container technology is helping modernize existing workloads and drive agile processes. Open source technologies are working to deliver the next wave of enterprise architecture.
  • Connecting Dev and Ops with Container
    Source: Red Hat
    Webcast: Learn how communities and open source projects such as Docker, Kubernetes, and others are coming together to deliver this next wave of enterprise application architecture.
  • Can a sledgehammer derail SD-WAN and Skype?
    Source: Citrix Systems
    Webcast: Wire cutters and sledgehammers make for an entertaining product demo! In this demo, NetScaler CTO Abhishek Chauhaun demonstrates the capabilities of the Citrix SD-WAN solution for delivering lossless Skype for Business connectivity even during a network failure. No other SD-WAN solution offers that!
  • Demystifying Containers
    Source: Red Hat
    Webcast: Container technology can deliver important benefits - such as developing applications quickly and enabling them to run efficiently. In this webcast, hear from one expert on the importance of open standards when it comes to containers and their interoperability with other environments.
  • Charting the Expanding Horizons of Big Data
    Source: EMA
    Webcast: Date / Time: Thursday, June 2 @ 11 am Pacific / 2 pm Eastern

    In its newest big data research, leading IT analyst firm Enterprise Management Associates (EMA) and 9sight Consulting will explore the value proposition of big data in the enterprise. Attend this webinar to learn not just the technology of big data but also the business of big data use cases and implementation strategies.

Results 1 - 15 of 118