Skip Links

Network World

Resource Library

  • Adaptive Security - Sharing Threat Intelligence Across the Enterprise
    Source: CDW
    Webcast: Security breaches have risen by 48% in the last year according to the IDG CSO State of Security report. The center for Strategic and International studies pegs the cost of these breaches between $375 and $575 billion! This webcast focuses on updating your security posture. CDW's experts, working with McAfee, now a part of Intel Security provide a new approach enabling organizations to effectively block threats, identify compromises, and expedite remediation to securely enable a safe and connected world using Adaptive Threat Protection.
  • Conquering Costs
    Source: CDW
    Webcast: Saving money on software licensing is no longer enough; smart organizations are focusing on software TCO and generating new benefits from this approach. This webcast gives you the details on the next generation best practices contained within CDW's Software License Management practice. This modern approach leverages the cloud for new capabilities that will delight end users and your management as well!
  • What iBeacons Mean for Your Existing Wireless Network and Your Business
    Source: Aerohive
    Webcast: You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business".
  • Gigabit Speed Wireless Networks with 802.11ac
    Source: Aerohive
    Webcast: With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans.
  • Understanding the Network Impact of 802.11ac
    Source: Aerohive
    Webcast: Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment.
  • Transforming Your Mobile Device into a Trusted Digital Identity
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • Mobile Authentication: A Simply Better User Experience
    Source: Entrust, Inc.
    Webcast: Take the hassle out of your security by simplifying your approach to authentication. Learn how to leverage mobile and mobile smart credentials, so you can transform your authentication platform, reduce headaches for your users and minimize costs.
  • A Guide to Mobile Enterprise Authentication
    Source: Entrust, Inc.
    Webcast: Learn how mobile maximizes your security, simplifies your approach to authentication and minimizes your costs - ultimately improving your user's experiences all by putting the security tools they need, on the device they love.
  • Exploring the Possibilities of Mobile and Security in the Digital Age
    Source: Entrust, Inc.
    Webcast: Explore mobile identities, mobile security and the ways mobile can transform and grow your business. Entrust Datacard's Mike Byrnes covers the position of mobile and mobile identities in the enterprise.
    Key Benefits:
    - Why Mobile Identities? - Understand what mobile identities are and discuss their benefits and impact on security.
    - Mobile Identities in Action - Delve into use cases on different ways mobile identities integrate with enterprises.
  • Box for Healthcare
    Source: Box
    Webcast: Learn how Box makes it easy for Healthcare and Life Sciences organizations to securely share content and collaborate across the healthcare continuum to better collaborate, share data, research and improve care delivery. Box supports HIPAA and HITECH compliance and signs HIPAA Business Associate Agreements with its customers.
  • AstraZeneca Employees use Box to Drive Change Through Innovation
    Source: Box
    Webcast: AstraZeneca, a global, innovation-driven biopharmaceutical business, has made Box's cloud content sharing and collaboration platform available to its 51,000 employees across more than 100 countries. AstraZeneca chose Box to power secure collaboration company-wide and with external parties, as well as to enable mobile access to information. Listen to David Smoley, Chief Information Officer, AstraZeneca discuss how Box secure file sharing, content management and collaboration has enabled the company to reinforce its cloud strategy.
  • Eliminating Shadow IT in Hospitals
    Source: Box
    Webcast: Shadow IT is hardware or software that is being used by employees within an enterprise that is not supported or approved for use by the organization's IT department.
  • Mobile Productivity and HIPAA, Together at Last
    Source: Box
    Webcast: Providence Anesthesiology Associates uses Box to streamline patient care to over 100,000 patients each year across 19 locations. They securely share Protected Health Information (PHI) in Box while staying HIPAA compliant and leveraging a mobile friendly platform for physicians to consume documents on their smart phones and tablets.
  • Data Security Breaches are the New Normal. Are You Prepared?
    Source: DataGravity
    Webcast: High profile data security breaches are occurring more frequently than ever before. Sensitive and confidential data, such as personally identifiable information (PII), proprietary business information, and intellectual property are being leaked beyond secure company perimeters. Many assume data breaches are caused by outside sources, but more often than not, they originate internally from careless data management and user activities, which in turn, can lead to compliance violations and expensive penalties. Do you know what's in your data and where you are most at risk? Listen to Perry Dickau, DataGravity Director of Product Management and Will Urban, Technical Marketing Manager, as they have an important discussion about data governance, risk and compliance.
  • Discover your Data Dilemma
    Source: IBM
    Webcast: Do you struggle with lack of visibility into what data is where and what value that data has to your organization? It is estimated that 69% of data within an organization has no business value. Rising risks from dark data and rising costs from ever growing data volume and storage are a constant concern for most organizations. Join our webinar to hear about how to:

    - Identify redundant, obsolete, trivial and risky data (by connecting to 75+ data sources including file shares and email systems)
    - Analyze data to determine business value
    - Act on the data (move, copy, delete) to lower cost and risk by cleaning up that data

Results 1 - 15 of 81