Skip Links

Network World

Resource Library

  • Six Steps to SIEM Success
    Source: AlienVault
    Webcast: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can:
    - Detect threats (known and emerging)
    - Identify vulnerabilities
    - Accelerate incident response
    - Identify policy violations
    - Simplify compliance management
  • PCI DSS v3.0: How to Adapt your Compliance Strategy
    Source: AlienVault
    Webcast: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. While the 12 main requirements remain the same, there are significant changes related to malware defenses, vulnerability assessments and penetration testing. During this 1-hour session, you'll learn:
    - What's new in PCI DSS version 3.0
    - Key considerations for adapting your compliance strategy
    - Technology recommendations for addressing new compliance requirements
    - How other companies have simplified PCI DSS compliance
  • Get Real-time Threat Detection Starting on Day 1 with AlienVault USM
    Source: AlienVault
    Webcast: AlienVault Unified Security Management™ (USM) integrates SIEM/event correlation with built-in tools for intrusion detection, asset discovery, vulnerability assessment and behavioral monitoring to give you a unified, real-time view of threats in your environment.

    Watch our recorded demo to see how USM makes it easy to accomplish these key tasks:
    - Discover all IP-enabled assets on your network
    - Identify vulnerabilities like unpatched software or insecure configurations
    - Detect network scans and malware like botnets, trojans & rootkits
    - Speed incident response with built-in remediation guidance for every alert
    - Generate accurate compliance reports for PCI DSS, HIPAA and more
  • How to Leverage Log Data for Effective Threat Detection
    Source: AlienVault
    Webcast: Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
  • How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation
    Source: AlienVault
    Webcast: Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
  • Networking in a Software-Defined World
    Source: F5 Networks
    Webcast: The new world of networking--it's a world that is intelligent, automated and self-provisioning. In this KnowledgeVault, see how IT leaders should adjust their networks so they can handle the new technologies accessing them and keep up with the demands of the business. A new architecture that helps enterprises accomplish this is Synthesis from F5. Synthesis lets enterprises deploy its Software-Defined Application Services over a number of devices from F5 and other networking vendors.
  • LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.
    Source: CA Technologies
    Webcast: Date: Wednesday, May 7, 2014, 10:00 AM EDT

    The backup and recovery market is quickly morphing as end-users weather a perfect storm hitting their infrastructure, affecting the efficiency of their operations. While trends point to a healthy and dynamic data protection market, end-users are faced with significant operational challenges driving the need to revisit the very essence of their data protection architecture.

    Traditional backup is going away, but where does this leave end-users?

    In this webcast, Eric Burgener, Research Director, Storage at IDC, and Christophe Bertrand, VP ARCserve Product Marketing at CA Technologies, will provide a perspective on these key trends and identify the requirements next generation data protection architectures need to meet to support IT and business objectives.
  • Top 3 Network Challenges Limiting IT Agility
    Source: Brocade Communications
    Webcast: Are technical challenges preventing you from building cloud infrastructures? This Webinar will explain the top three challenges facing network architects today, along with the key steps for improving IT agility. Join Brocade and guest Forrester Research in an interactive discussion to help you cut through the hype and focus on the top areas within networking that will propel you forward.
  • Endpoint Data Management: Protecting the Perimeter of the Internet of Things
    Source: Code42
    Webcast: Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it. Watch this on-demand webinar to learn more.
  • Integrate to Accelerate: Evolving Your Integration Strategy to Extend Beyond IT
    Source: IBM
    Webcast: These days, integration is no longer optional, but this ubiquity can hide the massive and rapid change which integration is undergoing. In fact, a variety of forces are coming together to change the way businesses integrate across their organization and community of business partners. According to leading analyst firm Gartner, in the next few years, we will see new approaches to integration being adopted by central IT and lines of business, increasing demand for more agile and hybrid deployments, and innovations such as analytics and API networks.

    In Gartner's recent report Predicts 2014: Nexus of Forces Drives Evolution of Integration Strategy, we can see how these forces are fundamentally changing the way businesses integrate today and tomorrow. Consider these strategic planning assumptions from the report:
    * By 2017, in large organizations at least 65% of new integration flows will be developed outside the control of IT departments.
    * By 2018, more than 40% of large organizations will have established a hybrid integration platform.
    * By 2017, 60% of new integration projects will leverage embedded analytics.
    * By 2018, the 10 largest B2B networks will have evolved into API networks.
    * By 2018, electronic B2B interactions will outnumber non-electronic ones.

    What does this mean for your business, and how can you gain a competitive advantage while responding proactively to the challenges ahead? Watch this webinar to hear Gartner analyst Benoit Lheureux's perspective on the forces driving the evolution of integration strategies, and get key recommendations to ensure your success.
  • Increasing the Value of Your Reports and Dashboards
    Source: IBM
    Webcast: Imagine this: Customer retention rates are down and you're charged with turning things around. Now imagine having up-to-the-minute access to a customer's likelihood of discontinuing service. Helpful? Extremely. Armed with this information, your team can resolve issues before your customer leaves.

    Watch the Charting Your Analytical Future webinar and through real-world examples like this, we explore how IBM Congos Business Intelligence is giving companies the insight they need to take action and change outcomes, including:
    * How predictive modeling and visualization can increase the value of your reports and dashboards
    * How to spot trends, predict behavior and yes, even see into the future
    * What it takes to incorporate predictive analytics and visualization into reports in a way that is intuitive and easy-to-use

    If you're interested in learning how to increase the value and power of your reports and dashboards by leveraging the latest advancements in Business Intelligence, watch now!
  • Mobile Apps and Devices Slash Customer Cycle Time
    Source: CDW
    Webcast: Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After procuring iPad devices from CDW and integrating mobile apps with back office systems, the company boosted productivity and reduced their customer cycle time by as much as 7X!
  • CDW Integrates with Google Apps for Cloud Collaboration
    Source: CDW
    Webcast: Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps. Watch and see why clients are evaluating moving over to this cloud based total collaboration experience and talk about the new app integration at Cisco Live 2013
  • Big Data and Analytics will transform your business - what you don't know will hurt you!
    Source: IBM
    Webcast: Feedback from over 23,000 actual Oracle big data and analytics (BDA) customers was analyzed by Solitaire Interglobal Ltd (SIL) and their findings are presented in this compelling webcast. Information from successful - and less than successful - BDA deployments illustrate how this technology improves business agility, increases revenue and improves customer loyalty. Kat Lind from Solitaire discusses the real-world impact on businesses and best practices for deploying BDA solutions using Oracle on a variety of platforms. Small through very large organizations will benefit from this informed analysis of cost, IT risk, business agility and customer satisfaction considerations in the rapidly growing area of big data and analytics.


    Chuck Calio
    Technical Leader
    IBM STG ISV Enablement

    Kat Lind
    Chief Systems Engineer
    Solitare Interglobal Ltd.
  • CDW Software Asset Management
    Source: CDW
    Webcast: SAM is a process, not a one off project. Chances are you've either been audited, or you will be soon. In fact, nearly two-thirds of all US business entities will be audited within the next 12 months.

    What do you do when you're being audited, and how can you ensure your business is in the strongest possible position when it happens? Listen to this important eSeminar to hear experts from Snow Software and CDW who will discuss the strategies and tactics you should be taking now to ready for the software audit you're more than likely going to undergo soon.

    Learn more about:
    - Which software is most likely to be problematic
    - How to keep close tabs on software installs, adds, deletions and changes
    - What tools will ease the Software Asset Management (SAM) burden
    - What to do today to prepare for an audit in the future

Results 1 - 15 of 22