Skip Links

Network World

Resource Library

  • End Users Speak: UC Helps Us, But We Need More
    Source: XO Communications
    Webcast: In this webcast, industry veteran Dan Toomey of XO Communications explores the results of recent IDG research that shows why there's a disconnect between UC usage and deployment, and how companies can gain the most value from their UC investments.
  • Converged Systems For Modern Datacenters
    Source: Dell Inc.
    Webcast: One of the key developments driving the modern data center is the growing use of converged systems. In this 5-Part webcast, Richard Villars, IDC Vice President, Datacenter & Cloud provides assessments on the development and adoption of solutions for datacenter transformation and exploitation of rapidly evolving technologies in the growing use of converged systems.

    * Current Level of Adoption
    * Key Benefits that Converged Systems Deliver
    * Where to Use Converged Systems
    * Planning for the Future
    * Convergence and the IT organization

    Intel InsideĀ®. Powerful Solution Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • Data-Centric Security & Encryption: Keeping Your Critical Data Safe
    Source: HP
    Webcast: Data's coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you're at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable -- get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.

    Presenter: Albert Biketi, Vice President & General Manager, HP Security, Atalla Voltage
  • Incident Response - What Is (and Isn't) Working Today
    Source: HP
    Webcast: Incident response is a hot topic among the SANS audience. In SANS' 2014 survey on Incident Response, only 9% of organizations felt their incident response process were "very effective," yet the majority of respondents operated under the assumption that they will be breached. This two-part webcast will focus on what is and isn't working for incident responders, what they can do about it, and how they can become more proactive in responding to incidents.

    Part 1 of this webinar will include:
    - A look at incident response expectations and the realities responders face
    - The state of incident response policies and practices
    - How those policies and practices have changed since the 2014 survey

    Presenter: Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
  • Entrust Datacard
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • Going Mobile: Why Build Versus Buy is Only Half the Conversation
    Source: Capriza
    Webcast: For mobile, you need to think beyond the usual build versus buy, given the unique factors involved. In this webinar, gain an in-depth look at 3 approaches to mobility: build, buy, and transform. Guest presenter Myckel Haghnazari, IT Director at Flextronics, will share how his company is tackling the mobility challenge.
  • Modernize Business Applications By Simplifying and Mobilizing
    Source: Capriza
    Webcast: Simplifying and mobilizing existing applications removes process complexity and increases business agility, but knowing where to start can be challenging. Learn how companies like Paramount, DirecTV, and Fleetcor have modernized their applications and how you can begin your journey.
  • Rethinking Big Data Platforms like Hadoop with Open Technology
    Source: IBM
    Webcast: Social, mobile, cloud and analytics are fundamentally changing how we live, work and interact. These technologies are fueling an unprecedented explosion of data - providing the potential for significant opportunity. With the right tools, you can uncover fresh insights in real time from this vast amount of data and act on them with confidence. IBM is helping organizations in every industry unlock the value of big data and analytics that can have a profound effect on their business.

    This webinar with Dr. Srini Chari, Managing Partner, Cabot Partners and IBM Distinguished Engineer Linton examines how organizations can derive high value insights by framing strategic business questions and combining systems of records with systems of engagement and how these can be achieved by implementing a high-performance, scalable and agile information foundation to support both real-time and large-scale analytics capabilities.

    Date: Wednesday, September 19, 2015

    Time: 02:00 PM Eastern Daylight Time

    Duration: 1 hour
  • Integrate legacy and cloud with Hybrid IT, not Hybrid Cloud
    Source: Gravitant
    Webcast: While most enterprises are turning to hybrid cloud, this model does not factor in legacy infrastructure or give business users the unified experience they demand. The true solution is an integrated, multi-sourced operating model called Hybrid IT.
  • Outthinking the Bad Guys
    Source: HP
    Webcast: Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Lockheed Martin webinar featuring Forrester Research: Threat Intelligence Platform Market Overview
    Source: Lockheed Martin
    Webcast: Join guest speaker, Principal Analyst Rick Holland with Forrester and Lockheed Martin's Christina Kawka for a webinar on Wednesday, September 16 at 12 PM ET on the importance of threat intelligence platforms in protecting your organization.
  • Understanding the Network Impact of 802.11ac
    Source: Aerohive
    Webcast: Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment.
  • Gigabit Speed Wireless Networks with 802.11ac
    Source: Aerohive
    Webcast: With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans.
  • What iBeacons Mean for Your Existing Wireless Network and Your Business
    Source: Aerohive
    Webcast: You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business".
  • United Airlines - "We Have Found a Product That Is That Powerful"
    Source: Zscaler
    Webcast: Learn why United Airlines relies on Zscaler to address some of their toughest security challenges. See Michael Kennaugh, VP of IT Business Management at United Airlines, speak about Zscaler at the 2014 RSA Conference.

Results 1 - 15 of 96