Skip Links

Network World

Resource Library

  • What iBeacons Mean for Your Existing Wireless Network and Your Business
    Source: Aerohive
    Webcast: You may have heard the buzz about iBeacon, a technology that enables proximity-based services for mobile devices. To learn about iBeacon and how it can impact your company, watch the recording of Aerohive's latest webinar, "What iBeacons Mean for Your Existing Wireless Network and Your Business".
  • Gigabit Speed Wireless Networks with 802.11ac
    Source: Aerohive
    Webcast: With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans.
  • Understanding the Network Impact of 802.11ac
    Source: Aerohive
    Webcast: Watch this webinar recording featuring Forrester Research for an overview of the current 802.11ac technology, a discussion on how high-speed Wi-Fi & application control impacts your network architecture, and take a look at how a proper network strategy can save you 40% or more on your investment.
  • Transforming Your Mobile Device into a Trusted Digital Identity
    Source: Entrust, Inc.
    Webcast: Leave outdated traditional two factor authentication in the past. Mobile authentication transforms a smartphone into a mobile smart credential. Now it's possible for users to securely identify themselves by simply clicking "ok" on their device, eliminating the hassle of a tradition hard token or physical cards.
  • Mobile Authentication: A Simply Better User Experience
    Source: Entrust, Inc.
    Webcast: Take the hassle out of your security by simplifying your approach to authentication. Learn how to leverage mobile and mobile smart credentials, so you can transform your authentication platform, reduce headaches for your users and minimize costs.
  • A Guide to Mobile Enterprise Authentication
    Source: Entrust, Inc.
    Webcast: Learn how mobile maximizes your security, simplifies your approach to authentication and minimizes your costs - ultimately improving your user's experiences all by putting the security tools they need, on the device they love.
  • Exploring the Possibilities of Mobile and Security in the Digital Age
    Source: Entrust, Inc.
    Webcast: Explore mobile identities, mobile security and the ways mobile can transform and grow your business. Entrust Datacard's Mike Byrnes covers the position of mobile and mobile identities in the enterprise.
    Key Benefits:
    - Why Mobile Identities? - Understand what mobile identities are and discuss their benefits and impact on security.
    - Mobile Identities in Action - Delve into use cases on different ways mobile identities integrate with enterprises.
  • Box for Healthcare
    Source: Box
    Webcast: Learn how Box makes it easy for Healthcare and Life Sciences organizations to securely share content and collaborate across the healthcare continuum to better collaborate, share data, research and improve care delivery. Box supports HIPAA and HITECH compliance and signs HIPAA Business Associate Agreements with its customers.
  • AstraZeneca Employees use Box to Drive Change Through Innovation
    Source: Box
    Webcast: AstraZeneca, a global, innovation-driven biopharmaceutical business, has made Box's cloud content sharing and collaboration platform available to its 51,000 employees across more than 100 countries. AstraZeneca chose Box to power secure collaboration company-wide and with external parties, as well as to enable mobile access to information. Listen to David Smoley, Chief Information Officer, AstraZeneca discuss how Box secure file sharing, content management and collaboration has enabled the company to reinforce its cloud strategy.
  • Eliminating Shadow IT in Hospitals
    Source: Box
    Webcast: Shadow IT is hardware or software that is being used by employees within an enterprise that is not supported or approved for use by the organization's IT department.
  • Mobile Productivity and HIPAA, Together at Last
    Source: Box
    Webcast: Providence Anesthesiology Associates uses Box to streamline patient care to over 100,000 patients each year across 19 locations. They securely share Protected Health Information (PHI) in Box while staying HIPAA compliant and leveraging a mobile friendly platform for physicians to consume documents on their smart phones and tablets.
  • Data Security Breaches are the New Normal. Are You Prepared?
    Source: DataGravity
    Webcast: High profile data security breaches are occurring more frequently than ever before. Sensitive and confidential data, such as personally identifiable information (PII), proprietary business information, and intellectual property are being leaked beyond secure company perimeters. Many assume data breaches are caused by outside sources, but more often than not, they originate internally from careless data management and user activities, which in turn, can lead to compliance violations and expensive penalties. Do you know what's in your data and where you are most at risk? Listen to Perry Dickau, DataGravity Director of Product Management and Will Urban, Technical Marketing Manager, as they have an important discussion about data governance, risk and compliance.
  • Discover your Data Dilemma
    Source: IBM
    Webcast: Do you struggle with lack of visibility into what data is where and what value that data has to your organization? It is estimated that 69% of data within an organization has no business value. Rising risks from dark data and rising costs from ever growing data volume and storage are a constant concern for most organizations. Join our webinar to hear about how to:

    - Identify redundant, obsolete, trivial and risky data (by connecting to 75+ data sources including file shares and email systems)
    - Analyze data to determine business value
    - Act on the data (move, copy, delete) to lower cost and risk by cleaning up that data
  • Siemens | Omneo: A Big Data Case Study
    Source: Dell Inc
    Webcast: Implementing an effective Big Data solution requires blending a number of distinct technologies into a cohesive whole. This webcast will look at IDC's perspective on the key issues that customers must consider regarding big data technologies, the Dell technologies that drive the solution, and then an actual customer presentation that showcases how the solution met the critical needs of Siemens. This solution combined information from 200 suppliers, 1600 products, 80,000 parts, 1 million customers, and 2 billion annual events into a cohesive analytics solution that dramatically improved the customer experience.

    Learn more about how a 360-degree perspective can help you become future-ready.

    Intel InsideĀ®. Powerful Solution Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • NetApp's Guide to Data Governance and Privacy for the Hybrid Cloud -- Ep1 Part 2
    Source: NetApp
    Webcast: Tune in to this ongoing video-on-demand and podcast series as we dive into the issues that executives need to be aware of when using cloud computing. Learn about important issues as we sit down with NetApp executives, market research analysts, and subject-matter experts to discuss data governance and privacy for the hybrid cloud.

Results 1 - 15 of 80