Skip Links

Network World

Resource Library

  • Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
    Source: EMA
    Webcast: Date / Time: Tuesday, June 28 @ 11 am Pacific / 2 pm Eastern

    While document and file sharing is increasing rapidly, 97% of organizations cite file sharing as a high risk for information loss, and 75% believe their organization is currently at risk for data loss. Join us to obtain guidance on how organizations can protect themselves from document sharing and e-signature risk while maintaining a high level of collaboration and productivity
  • Introducing EMC DSSD D5: Unprecedented Storage Performance for Mission-Critical Workloads
    Source: EMC Corporation
    Webcast: Date: Thursday, June 30, 2016, 02:00 PM EDT

    Are your mission-critical applications underperforming? Are you struggling to meet SLAs and delivering value to the business? What about developing and deploying new data-intensive applications? Attend this EMC sponsored webinar to learn how DSSD D5 can provide the performance demanded by today's and tomorrow's mission-critical workloads.

    During this webinar, EMC DSSD D5 Product Manager Rob Przykucki and other experts will:

    -Demonstrate how DSSD D5 Rack-Scale Flash offers fundamentally better performance than legacy storage
    -Detail the DSSD D5 innovations that enable an order of magnitude faster shared flash storage
    -How to take advantage of DSSD D5's next-generation storage performance
    -Provide a demonstration of DSSD D5's capabilities
  • Liberate Your Enterprise From Expensive DBMS to Drive Digital Business!
    Source: Enterprisedb Corporation
    Webcast: EDB Postgres is more than just a DBMS. EDB enterprise customers drive new and modernization IT initiatives using EDB Postgres to minimize risk and maximize savings. What if IT could free their core database management systems from traditional limitations and become a differentiator instead of a bottleneck to the business?
    Attend this webinar to learn how the open source based EDB Postgres Platform helps enterprises confidently deliver on the promise of digital business. We will present
    - The challenge to deliver digital business initiatives,
    - EDB Postgres value for the enterprise,
    - Steps to Take to Get To Success Quickly, and
    - Customer success stories showing EDB Postgres in action.
  • Forrester Quantifies Benefits of the Dell | Cloudera Apache Hadoop Solution
    Source: Dell and Intel®
    Webcast: Adopt Hadoop without prior experience or expertise and ensure a rapid ROI using the Dell reference architecture for the Dell | Cloudera Apache Hadoop Solution, accelerated by Intel®. This video quantifies the findings of a Forrester Consulting Total Economic that evaluates the potential financial impact and business benefits of the Hadoop solution on their organizations. The results are determined by speaking to customers about their Hadoop implementations and then using the Forrester method for assessing the cost, risks, flexibility and benefits of their deployments.

    Intel Inside®. Powerful Data Center Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • Case Study: Applying Big Data to the IoT
    Source: Dell and Intel®
    Webcast: Sensus deploys sophisticated, (no comma here) smart meters to monitor and measure energy consumption that generate large volumes of a wide variety of data. Hear from Sensus executives as they explain how migrating from an RDBMS to a Hadoop big data environment, built on a Dell | Intel infrastructure, enabled them to scale out linearly, analyze massive amounts of data in real-time, and leverage predictive analytics to transform the efficiency and responsiveness of their business.

    Intel Inside®. Powerful Data Center Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • Making Cybersecurity Manageable with Hi-Fidelity Security
    Source: EMA Research
    Webcast: Join David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Wade Williamson, director of threat analytics at Vectra Networks, to learn how to implement high-fidelity security to manage today's most challenging threats, efficiently and effectively.
  • How Nicklaus Children's Hospital Implements Secure Mobility
    Source: Citrix Systems
    Webcast: This video shows how Dr. Burke of Nicklaus Children's Hospital relies on Citrix and mobile devices to instantly access critical patient information, saving lives and diagnosing patients from anywhere.
  • OSS Has Taken over the Enterprise: The Top Five OSS Trends of 2015
    Source: Rogue Wave Software
    Webcast: Open source software (OSS) has taken over the enterprise, growing at an incredibly fast rate in mission critical applications. This Webcast examines the impact of open source software by explaining how you can implement usage controls and mitigate risks by discovering OSS in your codebase to eliminate bugs, reduce security vulnerabilities, and ensure license controls.
  • Live Webcast 7/12/16: Automating the Identity Lifecycle with Okta Provisioning
    Source: Okta
    Webcast: Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth.

    In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI.

    We look forward to you joining us for the live event!
  • IDC and Riverbed Webcast: Experience the Future of Networking with SD-WAN
    Source: Riverbed Technology
    Webcast: Traditional approaches to networking are failing in today's hybrid era of IT. View this webcast to learn why as Brad Casemore, Research Director at IDC, joins leaders from Riverbed Technology to explore the drivers for modernizing legacy network architectures. See why SD-WAN is redefining the future of networking, and get an in-depth preview of Riverbed's strategy to enable fast, agile, and secure application delivery in a cloud-centric world.
  • Using Skype for Business? Is it Time to Re-Think Your Infrastructure
    Source: Citrix Systems
    Webcast: In this webinar Skype for Business MVP Alex Lewis and Citrix expert Derek Yee discuss common deployment considerations and how to better monitor and enhance Skype for Business performance through a load balancer.
  • Protect Your Business From Ransomware
    Source: Kaspersky Lab
    Webcast: Cybercriminals raked in an average of $24 million in 2015 from reported Ransomware attacks. It's a growing market with lots of opportunity that shows no signs of slowing down. Find out how you can protect your company from this rapidly growing threat.
  • NSA Director Addresses Cyber Risk Board Forum Attendees
    Source: NYSE Governance Services
    Webcast: Watch NSA Director Admiral Michael S. Rogers discuss the current cyber environment, challenges, and opportunities between the public and private sectors.
  • Jumpstart HITRUST CSF Certification with a Proven Methodology
    Source: Coalfire
    Webcast: Have you received a letter requiring you to be HITRUST CSF certified or are you considering HITRUST as a way to manage compliance regulations? Learn about the HITRUST CSF assessment process, the importance of a proven assessment methodology, and how to avoid common pitfalls that can increase costs.
  • Medical Device Security: How to Protect Data in a Connected World
    Source: Coalfire
    Webcast: Learn what medical device manufacturers are doing, or not doing, to embed security into devices and find out about best practices that healthcare providers can implement to increase data security. Learn how to apply FDA guidance and engage industry working groups related to medical device security.

Results 1 - 15 of 121