Skip Links

Network World

Resource Library

  • Networking in a Software-Defined World
    Source: F5 Networks
    Webcast: The new world of networking--it's a world that is intelligent, automated and self-provisioning. In this KnowledgeVault, see how IT leaders should adjust their networks so they can handle the new technologies accessing them and keep up with the demands of the business. A new architecture that helps enterprises accomplish this is Synthesis from F5. Synthesis lets enterprises deploy its Software-Defined Application Services over a number of devices from F5 and other networking vendors.
  • Answering the Tough Question: Who Has Access to What?
    Source: Dell Software
    Webcast: Learn how to select specific users or groups in Active Directory (AD), and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.
  • LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.
    Source: CA Technologies
    Webcast: Date: Wednesday, May 7, 2014, 10:00 AM EDT

    The backup and recovery market is quickly morphing as end-users weather a perfect storm hitting their infrastructure, affecting the efficiency of their operations. While trends point to a healthy and dynamic data protection market, end-users are faced with significant operational challenges driving the need to revisit the very essence of their data protection architecture.

    Traditional backup is going away, but where does this leave end-users?

    In this webcast, Eric Burgener, Research Director, Storage at IDC, and Christophe Bertrand, VP ARCserve Product Marketing at CA Technologies, will provide a perspective on these key trends and identify the requirements next generation data protection architectures need to meet to support IT and business objectives.
  • Increasing Application Visibility in Your Network Monitoring
    Source: Compuware
    Webcast: Date: Thursday, May 8th, 2014
    Time: 1:00 PM EDT / 10:00 AM PDT

    Join Compuware and guest speaker John Rakowski, Forrester Research Analyst for Infrastructure and Operations, to learn why network monitoring is in need of a strategic change: a focus on application and business-user awareness alongside traditional infrastructure components.
  • Top 3 Network Challenges Limiting IT Agility
    Source: Brocade Communications
    Webcast: Are technical challenges preventing you from building cloud infrastructures? This Webinar will explain the top three challenges facing network architects today, along with the key steps for improving IT agility. Join Brocade and guest Forrester Research in an interactive discussion to help you cut through the hype and focus on the top areas within networking that will propel you forward.
  • Take the Cost Out of Deploying Desktop Virtualization
    Source: Citrix Systems, Cisco, & NetApp
    Webcast: To achieve the full benefits of desktop virtualization, you need to be able to scale and optimize deployments. To do that, you must first understand where the bottlenecks are and how to overcome them. View this panel discussion to learn how to reduce infrastructure, deployment, and operations costs.
  • How to Optimize and Scale the Deployment of Virtual Desktops
    Source: Citrix Systems, Cisco, & NetApp
    Webcast: To achieve the full benefits of desktop virtualization, IT must be able to scale and optimize deployments. Converged solutions, which combine desktop operating systems and applications combined with compute, network, and storage are increasingly seen as the ideal solution. View this panel discussion to discover why.
  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • How to Protect Enterprise Data Yet Enable Secure Access for End Users
    Source: Code42
    Webcast: Watch this on-demand webinar to learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and immediate steps for better protecting enterprise data while providing end users with secure data access.
  • Endpoint Data Management: Protecting the Perimeter of the Internet of Things
    Source: Code42
    Webcast: Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it. Watch this on-demand webinar to learn more.
  • Mobile Security: Containerizing Enterprise Data
    Source: Code42
    Webcast: Enterprise mobility presents many exciting opportunities for the business, but it can also create a new set of competing requirements within the organization. Mobilizing an entire workforce introduces significant risk to the enterprise; before any technology is implemented, organizations must review corporate requirements and respond with the appropriate security measures.

    Enterprise IT teams exploring the realm of mobile device management (MDM) must first determine the best way to ensure security and compliance of corporate data while giving users the flexibility to work how and where they want. But which data and apps need to be protected, and what type of security should be added?

    In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM, and how the containerization of data can help your organization "bring-work-to-devices" (BWTD) in the most secure and compliant manner.
  • On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"
    Source: Code42
    Webcast: It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

    And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

    Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.
  • Video Stream Quality Impacts Viewer Behavior
    Source: Akamai Technologies, Inc.
    Webcast: Today content providers are challenged to provide a high-quality streaming experience for their viewers and also monetize their video content through ad-based or subscription-based models. This scientific white paper, using statistical data from Amakai's streaming network, analyzes how changes in video quality cause changes in viewer behavior. Download it now.
  • Tales from the Trenches - Industry Risks and Examples of DDoS
    Source: Neustar Inc.
    Webcast: Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.
  • Ecommerce Site Needs Protection Against Cyber 'Pirate'
    Source: Neustar Inc.
    Webcast: Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.

Results 1 - 15 of 85