Skip Links

Network World

Resource Library

  • 2017 U.S. State of Cyber Crime
    Source: Forcepoint
    Webcast: Building a cyber-security plan to protect against the latest threats and position defenses for new attacks is critical. An essential resource for cyber-security teams to build effective defenses is accurate data on the threat landscape.

    This webinar provides the latest data on this critical topic from the US State of Cybercrime Study. In its 15th year, this study is conducted annually by CSO, in partnership with the US Secret Service, the CERT Coordination Center at Carnegie Mellon University, and Forcepoint. Experts from Forcepoint and CSO magazine will provide the insight you need to create the optimal cyber-strategy for your organization.
  • How Hatco Protects Against Ransomware with Druva on AWS
    Source: Amazon Web Services
    Webcast: Occupying continuous front page coverage, the WannaCry ransomware attack in May 2017 infected more than 230,000 computers in over 150 countries. With ransomware attacks on the rise and forecasted to exceed $5 billion in costs in 2017, businesses and government agencies alike have found themselves at a loss - how to reduce ransomware risks now, while proactively preparing a response for the future.

    Join us to Learn:
    • Factors and issues that put your organization's data at risk.
    • Proactive strategies for protecting your data from malicious attacks.
    • Steps you can take to gain immediate access to your critical data during and after an attack.
  • Operate at market speed and increase employee productivity with Secure Virtual Workspace for Financial Services
    Source: Citrix Systems
    Webcast: We are in a new era of digital transformation - unleash productivity and operate at market speed.Watch this video and hear from Jennifer Smith, industry solutions marketing financial services, to learn more about HPE Secure Virtual Workspace for Financial Services.
  • Baloise Group uses Citrix Workspace Suite to provide true flexibility to employees
    Source: Citrix Systems
    Webcast: Only Citrix offers the most complete and integrated workspace to enable people to securely access their apps, desktops and data from anywhere. Rely on Windows app and desktop delivery from XenApp and XenDesktop, device security from XenMobile, secure file sync and sharing with ShareFile, and network security with NetScaler. And only a Citrix Workspace offers you complete choice of device, cloud and network, streamlined for IT control and simple, secure access for users.

    Watch this video to learn how Baloise Group uses Citrix Workspace to provide complete flexibility to it's employees.
  • How Western Union Maintains Robust Security at Scale with Dome9 Arc on AWS
    Source: Amazon Web Services
    Webcast: How do you establish and maintain a robust security posture in your AWS environment even as you rapidly grow your footprint and scale operations? This was the question that the security and operations teams at Western Union faced as they built out their presence on the AWS Cloud. They discovered that Dome9 Arc delivered greater visibility and control over the new customer's cloud assets and security posture, with active protection of cloud workloads against vulnerabilities and attacks, as well as proactive compliance management.

    Join the upcoming webinar with AWS, and Dome9 to learn how you can use the native security controls on AWS, combined with the powerful capabilities of Dome9 Arc, to ensure your business remains secure and compliant on the AWS Cloud, at any scale.

    Join Us to Learn:
    • Methods for mitigating top security concerns for enterprises deploying workloads to the cloud
    • AWS best practices and tools used to achieve robust security in cloud environments
    • How visibility, automated compliance and active protection deliver better cloud security

    When: Oct. 17, 2017 | 8 am PDT/11 am EDT
  • Automation Accelerates Your Journey to Big Data
    Source: BMC Software
    Webcast: Getting started with Big Data is a journey and in the Big Data world, this means "What platform will you use?"; "How will you set up the IT architecture?" etc. At various points in the journey, you'll need to find solutions - from existing data sources and IT infrastructure to the Big Data environment - and there will be tolls to pay (planning and development time, and possibly new tools you may need to buy). Are you ready for the journey?
  • Negotiating a Microsoft Audit or SAM Engagement
    Source: Method 180
    Webcast: Knowledge gives you the power and leverage you need in Microsoft Audits or SAM Engagements. This free video will show you how your software vendors utilize audits to generate revenue, and what you can do to ensure you only pay for what you are actually using.
  • Extending Dell EMC Enterprise Hybrid Cloud with Puppet Enterprise & VMware vRealize Automation
    Source: VMware, Dell EMC, & Puppet
    Webcast: Enterprises of all sizes are challenged with demands from customers and IT for agility and efficiency. And as digital transformation takes hold, many enterprises are turning to the cloud. But IT transformation is no easy task. Many strategies include hybrid cloud, which provisions applications, services and even operation. This webcast will look at the challenges of cloud services, delivery and operations, as well as the benefits of automating your cloud environments.
  • FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
    Source: Digital Shadows
    Webcast: FBI Cyber Squad guest speaker, Special Agent Adam Karcher, and Rick Holland, Vice President of Strategy for Digital Shadows discuss emerging Cyber Threats, Persistent Vulnerabilities and Strategies for Protecting Your Enterprise from Digital Risks across the visible, deep and dark web.
  • Enterprise Linux: Justify your migration from Red Hat to CentOS
    Source: Rogue Wave Software
    Webcast: Date: Wednesday, October 11, 2017, 01:00 PM EDT

    Red Hat Enterprise Linux (RHEL) is the dominant distribution used by commercial organizations today yet many struggle with rising costs and support challenges. The fact is, there's a functionally-compatible alternative that offers more flexible options when it comes to licensing, support, and cost effectiveness. Whether you're thinking about moving away from RHEL or have already made the decision, this webinar gives you the background, proof points, and data to justify the move to CentOS.

    Tailored for enterprise architects, IT leaders, and anyone considering an alternative Linux distribution, you'll learn:

    • Top considerations for selecting an enterprise-grade OS (including Red Hat, CentOS, Ubuntu, and more)
    • Why CentOS exists and its relationship to RHEL
    • How CentOS compares for functional compatibility, licensing, support, and cost
    • The impact migration may have on your existing stack

    At the end of this webinar, you will have all the data you need to consider for an enterprise Linux migration and you'll understand why CentOS is a viable and cost-effective solution.

    We look forward to you joining us for the live event!
  • 5 Mistakes People Make Negotiating Microsoft Enterprise Agreements Office365
    Source: Method 180
    Webcast: Watch this short video to learn more about understanding your software deployments, deconstructing Microsoft bundles, and understanding what WIN means.
  • Digital Media: Protecting Your OTT Content Distribution Webinar
    Source: Neustar Inc
    Webcast: Digital is an inexorable part of our lives. Whether it's your cell phone, laptop or wearable device, our demand for digital media is continuous and insatiable. There are strict guidelines and requirements in place that govern how, where and by whom specific kinds of digital media can be consumed. These guidelines may apply to movies, music, live broadcasts and many other types of electronic media.

    For years, Neustar has helped digital content providers manage and enforce geocompliance through advanced technology solutions such as Neustar GeoPoint and Neustar IP Intelligence. In this webinar, we review the best practices for digital rights compliance and how to protect your OTT content in a global and increasingly mobile consumer market.
  • IPI Fraud Case Study
    Source: Neustar Inc
    Webcast: Watch this video to learn how Swiftcover, an online insurance company along with Neustar IP Intelligence was able to avoid:

    - Illegal sales outside their territory
    - Regulatory Fines
    - Losses from online fraud
  • Build Engaging Applications with Salesforce Heroku and AWS
    Source: Amazon Web Services
    Webcast: Register for our upcoming webinar to learn how Salesforce Heroku can help you reduce infrastructure overhead and more easily build engaging applications on AWS
  • Best Practices on Shoring Up DNS for 2017
    Source: Neustar Inc
    Webcast: Good DNS management is pivotal to strong security. Is your DNS strategy ready for new types of attacks? Utilizing a single Managed DNS provider isn't the only answer. Tom Pageler, CRO & CSO at Neustar, and Michael Smith, Chief Compliance Office at Neustar will explore best practices of DNS management and how Neustar is taking steps to ensure DNS versatility.

    In this webcast you will learn:

    • Why it makes sense to have a backup DNS provider
    • What IoT Insecurities are and the precautions that should be taken
    • DNS Best Practices
    • Advances: Neustar DNS Shield
    • Does your current DNS strategy stack up - and are you ready for the next generation of Internet demands?

Results 1 - 15 of 77