Skip Links

Network World

Resource Library

  • 10 Rules to Minimize Network Outages
    Source: NetBrain Technologies
    Webcast: When the network goes down, every minute counts. Network outages cost enterprises $1.7B in lost revenue last year, and much of it could have been avoided. So what can you do to shorten, or even avoid, network outages altogether? Join our panel of network experts for this educational webcast where we'll reveal 10 rules to minimize both the time and likelihood of a network outage. We'll leverage NetBrain's map-driven automation software to showcase one solution for implementing these 10 rules.

    Watch this one hour webcast to discover:
    * The top causes of network outages
    * Five rules to shorten a network outage
    * Five rules to avoid network outages
    * A troubleshooting use case from the world's second largest financial information provider
  • Data Warehousing and Analytics In the Cloud: Understanding The Options
    Source: EMA
    Webcast: Many organizations are either leveraging or evaluating data warehousing and analytics in the cloud as part of a broader information management strategy. Making the right cloud implementation choices require due diligence on the part of project stakeholders and an understanding of what market options exist. Join us to understand your options!
  • On-Demand Webcast: What Do Your Top 5 Cyber Security Threats Have in Common?
    Source: RES Software
    Webcast: Cybercriminals have figured out how to monetize their malicious actions and they're going after the opportunity with ferocity, targeting individuals and corporations alike. The future of ransomware alone is terrifying. Take a look at what Intel's McAfee Labs predicts over the next five years. They number the at-risk users, connections and devices - including wearable devices - in the billions.

    Ransomware is only one of the cyber security threats IT needs to watch out for. In this webinar, we'll explore the top 5 cyber security threats and how to avoid them. Can you guess what they have in common?
  • Ask the Analyst: Key Elements of an Effective Security Program
    Source: AlienVault
    Webcast: Date: Tuesday, June 28, 2016, 03:00 PM EDT

    The goal of a well-developed security program is to ensure that your team has the data, tools, expertise and processes needed to detect and respond quickly in the event of a threat. So, what are the critical elements of an effective security monitoring program? Join us for an engaging 30-minute discussion where AlienVault CEO Barmak Meftah will interview guest speaker Forrester Security Analyst Joseph Blankenship on how organizations should assess their security program, validate the effectiveness of security monitoring tools, and plan for the future. This session will also provide a unique opportunity to ask the analyst your questions.

    Featured Speakers:

    Joseph Blankenship - Senior Analyst, Forrester

    Barmak Meftah - CEO, AlienVault

    Moderator: Barbara R. Call - Digital Content Director, IDG Strategic Marketing Services
  • How to Achieve Lower Total Cost of Ownership with your Voice
    Source: Level 3 Communications
    Webcast: Trimming costs by eliminating underutilized ISDN-PRI circuits at every office site is the easiest measurement of gained cost/efficiency when an enterprise moves from legacy services to UC&C solutions. But this is really the low-hanging fruit of the transition and doesn't capture medium to longer term savings and gained operational efficiencies that help drive growth. Focus on defined area of true TCO that an IT/Voice Architect, or Procurement VP should evaluate and discuss with potential network service providers.
  • Gamification of a Fortune 20 SOC
    Source: Hewlett Packard Enterprise
    Webcast: Many Security Operations Centers (SOCs) struggle in 3 key areas when it comes to personnel: continuous training, extending retention and measuring effective KPIs. In this talk Marcel Hoffmann and Josh Stevens introduce the combination of gamification, user experience and machine learning as a concept to address these 3 challenges.
  • SIEM is dead. Long Love the SIEM!
    Source: Hewlett Packard Enterprise
    Webcast: SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

    We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn't a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.
  • Continuous Monitoring: How HPE Security Can Protect Your Users, Apps, and Data
    Source: Hewlett Packard Enterprise
    Webcast: Overcome the obstacles of technology, reliance on point solutions, and managing security as a silo function. HPE Converged Security Services helps you to enhance your current security practices and protect your entire digital enterprise by weaving security needs into the IT value chain. Key benefits include:
    - Improve and accelerate incident resolution
    - Deliver more secure applications-applications account for 84% of breaches
    - Remove duplication of effort and streamline operations
    - Reduce the cost of ensuring security compliance
    - Reduce the risk from security breaches
  • DAST Concepts and Practices
    Source: Hewlett Packard Enterprise
    Webcast: The world of web development has evolved and the tactics for securing it have advanced as well. Join Jonathan Griggs, the product manager for HPE Security WebInspect and WebInspect Enterprise, as he covers the concepts and practices around using a dynamic application security testing tool in a modern software security assurance program.
  • Lacking in appsec resources? You're not alone.
    Source: Hewlett Packard Enterprise
    Webcast: The number of applications has increased considerably and organizations are finding they do not have the time, let alone the expertise and resources, to manage an appsec program. In this Coffee Talk, we will make you aware of options available so you can ensure the applications your business depends on, are secure. HPE Security Fortify on Demand is a managed service that allows your organization to stay on top of security vulnerabilities and the latest threats, without the stressors of doing it all yourself.
  • Static Application Security Testing (SAST)
    Source: Hewlett Packard Enterprise
    Webcast: With cyber crime becoming more frequent and sophisticated, Static Application Security Testing (SAST) is an increasingly vital activity for an organization. Web applications and software are prime targets for hackers. SAST can help organizations find and fix vulnerabilities in their applications not only at testing, but early in the development lifecycle. Learn how an effective SAST program can reduce risk, but also scale and augment other security efforts, saving time and money in the long run.
  • SAP Applications Secure Against Breaches using HPE Fortify
    Source: Hewlett Packard Enterprise
    Webcast: While the value of your information is growing, security threats such as attacks or information theft are making headline news every day and becoming more serious. With SAP and HPE customers investing significantly in mobile solutions, web applications, and customization, it is critical now more than ever to invest in application security solutions.

    Did you know?
    - 43% of companies had a data breach in the past 2 years
    - 84% of breaches occur at the application layer
    - 75% of mobile applications fail basic security tests
    - It is 30x more expensive to fix issues in production than while in project phase

    Please join this webinar where our presenter will share the current application security vulnerability situation, common challenges and the approach SAP has taken to ensure application security of its software using HPE Fortify solution.
  • Hunting Today: Using Existing Technology to Hunt Cyber Threats
    Source: Hewlett Packard Enterprise
    Webcast: The idea of a "hunt team" is becoming quite popular. Everyone building a hunt team wants the best and fastest data stores, visualization engines, and pre-canned data science algorithms to magically (and very quickly) find needles in haystacks. But let's be honest, we can't afford to get exactly what we want. And if we could afford it, what we exactly want doesn't even exist to buy at this time. In this talk, we'll look at how you can use visualizations and basic statistics with your existing tools to catch more bad guys.
  • Applied Security Analytics
    Source: Hewlett Packard Enterprise
    Webcast: Many organizations are looking at using big data to detect more advanced adversaries. We are collecting more information than ever before, but what are we doing with it? In this talk, we will look at some ways you can use data science and visualization tools to get more out of the data you collect. Visualizations will let you see what is happening at a high level: A picture is worth a thousand log entries. There are data science techniques that other industries, such as advertising, have used successfully. We can apply these techniques to find patterns of behavior that are out of the ordinary, and ultimately catch more bad guys.
  • HPE Security ArcSight Analytics
    Source: Hewlett Packard Enterprise
    Webcast: Analytics, as they pertain to the security space, are a new horizon for most. With the universal rise in interest in applying analytics to security data and use cases many organizations are overwhelmed by the difficulties surrounding those technologies. Whether it is the cost and rarity of expert manpower, scale and speed of the data, or the immaturity of many of the technologies; many organizations need help making sense of this new frontier and how and where to apply it to their data sets. HPE Security ArcSight has taken the lead in making this emerging technology more readily consumable through the targeted use of analytics for particular datasets and use cases. In this vein HPE Security ArcSight has launched two security analytics offerings: User Behavior Analytics, and DNS Malware Analytics. Please join us in this webcast to learn more about these technologies and how they are making big impacts for security organizations of all sizes.

Results 1 - 15 of 145