Skip Links

Network World

Resource Library

  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • How to Protect Enterprise Data Yet Enable Secure Access for End Users
    Source: Code42
    Webcast: Watch this on-demand webinar to learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and immediate steps for better protecting enterprise data while providing end users with secure data access.
  • Endpoint Data Management: Protecting the Perimeter of the Internet of Things
    Source: Code42
    Webcast: Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it. Watch this on-demand webinar to learn more.
  • Mobile Security: Containerizing Enterprise Data
    Source: Code42
    Webcast: Enterprise mobility presents many exciting opportunities for the business, but it can also create a new set of competing requirements within the organization. Mobilizing an entire workforce introduces significant risk to the enterprise; before any technology is implemented, organizations must review corporate requirements and respond with the appropriate security measures.

    Enterprise IT teams exploring the realm of mobile device management (MDM) must first determine the best way to ensure security and compliance of corporate data while giving users the flexibility to work how and where they want. But which data and apps need to be protected, and what type of security should be added?

    In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM, and how the containerization of data can help your organization "bring-work-to-devices" (BWTD) in the most secure and compliant manner.
  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • Workforce Mobilization for Improved Productivity
    Source: Attachmate
    Webcast: A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how easy it can be.
  • Making Legacy Apps Available to Your Mobile Workforce
    Source: Attachmate
    Webcast: How is your IT organization responding to the mobility revolution? When it comes to your legacy IBM mainframe and midrange applications, you can give your mobile workforce the same functionality they have on their desktops, without requiring invasive changes to those applications. Watch how Attachmate Verastream can enable mobile access, in three different ways.
  • It's Chaos Out There
    Source: HP
    Webcast: Worried about your mobile apps? You should be; it's chaos out there. Check out this humorous video and see if you can recognize each of the types of vulnerabilities inflicted on these poor people.
  • Mining Profit from Location Based Services
    Source: Ruckus Wireless
    Webcast: Businesses understand the high value of getting users just the right content at precisely the right time and at the right place. But delivering on such promise and potential means knowing where these people and their devices are located. That's where location-based services are rising to the challenge, as this insightful webcast will demonstrate.
  • Mobile Apps and Devices Slash Customer Cycle Time
    Source: CDW
    Webcast: Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After procuring iPad devices from CDW and integrating mobile apps with back office systems, the company boosted productivity and reduced their customer cycle time by as much as 7X!
  • Collaboration 2013: Where Mobility Meets Connectivity
    Source: CDW
    Webcast: Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives into the issues surrounding mobility and collaboration. Hear how enterprises are making investments in collaboration, how field sales, project planning and customer care are leading the charge, the cloud vs. on-premises debate and key considerations for meeting the compliance and security challenges of mobile collaboration.
  • What's New in SharePoint: Social Collaboration for the Mobile Workforce
    Source: CDW
    Webcast: With the release of SharePoint 2013, SharePoint Online became an attractive collaboration platform for many organizations. Not only does the option of a hosted solution minimize infrastructure planning to simplify the deployment process, the latest SharePoint Platform also introduces a myriad of additional benefits that lead to increased user adoption and productivity whether deployed On Premise, Online, or in Hybrid.
  • CDW Integrates with Google Apps for Cloud Collaboration
    Source: CDW
    Webcast: Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps. Watch and see why clients are evaluating moving over to this cloud based total collaboration experience and talk about the new app integration at Cisco Live 2013
  • Network Circulation
    Source: CDW
    Webcast: Improve Network Circulation -- increase efficiency, reduce latency and enhance user experience on both wired and wireless networks with a network optimization solution from CDW
  • Redefine Your IT Operations: Remote Office IT Has Never Been Simpler
    Source: Dell Inc.
    Webcast: Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what you need in your remote and branch offices to redefine your IT operations. Take advantage of the onboard shared storage, then scale over time as needed. Manage servers, storage and networking with a unified management tool presented in a single console.

Results 1 - 15 of 17