Skip Links

Network World

Resource Library

  • Data-Centric Security & Encryption: Keeping Your Critical Data Safe
    Source: HP
    Webcast: Data's coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you're at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable -- get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.

    Presenter: Albert Biketi, Vice President & General Manager, HP Security, Atalla Voltage
  • Incident Response - What Is (and Isn't) Working Today
    Source: HP
    Webcast: Incident response is a hot topic among the SANS audience. In SANS' 2014 survey on Incident Response, only 9% of organizations felt their incident response process were "very effective," yet the majority of respondents operated under the assumption that they will be breached. This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.

    Part 1 of this webinar will include:
    - A look at incident response expectations and the realities responders face
    - The state of incident response policies and practices
    - How those policies and practices have changed since the 2014 survey

    Presenter: Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
  • Entrust Datacard
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • Going Mobile: Why Build Versus Buy is Only Half the Conversation
    Source: Capriza
    Webcast: For mobile, you need to think beyond the usual build versus buy, given the unique factors involved. In this webinar, gain an in-depth look at 3 approaches to mobility: build, buy, and transform. Guest presenter Myckel Haghnazari, IT Director at Flextronics, will share how his company is tackling the mobility challenge.
  • Modernize Business Applications By Simplifying and Mobilizing
    Source: Capriza
    Webcast: Simplifying and mobilizing existing applications removes process complexity and increases business agility, but knowing where to start can be challenging. Learn how companies like Paramount, DirecTV, and Fleetcor have modernized their applications and how you can begin your journey.
  • Rethinking Big Data Platforms like Hadoop with Open Technology
    Source: IBM
    Webcast: Social, mobile, cloud and analytics are fundamentally changing how we live, work and interact. These technologies are fueling an unprecedented explosion of data - providing the potential for significant opportunity. With the right tools, you can uncover fresh insights in real time from this vast amount of data and act on them with confidence. IBM is helping organizations in every industry unlock the value of big data and analytics that can have a profound effect on their business.

    This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.

    Date: Wednesday, September 19, 2015

    Time: 02:00 PM Eastern Daylight Time

    Duration: 1 hour
  • Integrate legacy and cloud with Hybrid IT, not Hybrid Cloud
    Source: Gravitant
    Webcast: While most enterprises are turning to hybrid cloud, this model does not factor in legacy infrastructure or give business users the unified experience they demand. The true solution is an integrated, multi-sourced operating model called Hybrid IT.
  • Outthinking the Bad Guys
    Source: HP
    Webcast: Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Lockheed Martin webinar featuring Forrester Research: Threat Intelligence Platform Market Overview
    Source: Lockheed Martin
    Webcast: Join guest speaker, Principal Analyst Rick Holland with Forrester and Lockheed Martin's Christina Kawka for a webinar on Wednesday, September 16 at 12 PM ET on the importance of threat intelligence platforms in protecting your organization.
  • Understanding the Network Impact of 802.11ac
    Source: Aerohive
    Webcast: Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment.
  • Gigabit Speed Wireless Networks with 802.11ac
    Source: Aerohive
    Webcast: With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans.
  • What iBeacons Mean for Your Existing Wireless Network and Your Business
    Source: Aerohive
    Webcast: You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business".
  • United Airlines - "We Have Found a Product That Is That Powerful"
    Source: Zscaler
    Webcast: Learn why United Airlines relies on Zscaler to address some of their toughest security challenges. See Michael Kennaugh, VP of IT Business Management at United Airlines, speak about Zscaler at the 2014 RSA Conference.
  • Zscaler Secures 180,000+ Jabil Employees across 24 countries
    Source: Zscaler
    Webcast: Jabil, a leading global manufacturer, uses Zscaler not just to manage employees but to protect their entire company. See John Graham, CISO at Jabil, explain how Zscaler helps them protect their intellectual property and 180,000+ employees, at scale, with near zero latency.
  • Mobility: The Game-Changer for your Organization
    Source: Citrix | HP
    Webcast: IDG Research shows a majority of companies (59 percent) allow their employees to do work using their own devices either away from their office or at work. But how can companies make it work together, so employees can enjoy consumer-level ease of use with enterprise-level productivity? In this webcast, hear from two experts on how to make some critical decisions about optimizing your mobile workforce.

Results 1 - 15 of 94