Skip Links

Network World

Resource Library

  • Spies Among Us: Defending Against State-Sponsored Insider Threats
    Source: ObserveIT
    Webcast: Live April 26th @ 11:00 AM EDT

    Nation State insider attacks are one of the biggest threats to information assets. Nation State threat actors are increasingly targeting businesses, universities and other organizations with powerful and sophisticated tradecraft techniques designed to steal confidential information that can result in massive data and revenue loss.

    This briefing will discuss the emergence of nation state-sponsored global talent recruitment platforms, the growing threats these information-hunting efforts represent, and how to mitigate the associated risk for your organization.
  • Today's State of Vulnerability Response: Patch Work Requires Attention
    Source: ServiceNow Inc
    Webcast: Date: Tuesday, May 15, 2018, 01:00 PM EDT

    Major data breaches are headline news, but well-publicized breaches are only the tip of the iceberg. To better understand why large scale breaches continue to occur, ServiceNow conducted a survey of more than 2,900 security professionals that are involved in vulnerability response across 9 countries. The survey uncovered that almost half of the organizations surveyed experienced a breach in the past two years, and over lost 12 days on average dealing with manual processes. Falling through the cracks has implications. Join this webinar to learn more about the survey results and the best practices which leading security organizations follow.
  • AWS, VMware and the New Connection for Enterprises
    Source: Digital Realty
    Webcast: Two of the biggest names in cloud have gone from rivals to partners. In August 2017, VMWare became officially live on AWS which was huge news for enterprises. Together, these two companies make a powerful combo, with one dominating in the private cloud and the other in the public cloud. Through AWS Direct Connect which can be accessed via Digital Realty locations, enterprises can now have the best of both worlds with a seamlessly integrated hybrid cloud strategy. This will enable enterprises to easily move applications between their on-premises environments and AWS without having to purchase new hardware, rewrite their applications, or modify their operations.
  • Contextual access to apps and data anywhere, any time, on any device
    Source: Citrix Systems
    Webcast: Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn't have access to sensitive applications and data. That's where Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we'll show you how.
  • Recover from malware and ransomware
    Source: Citrix Systems
    Webcast: We live in an era where ransomware and malware attacks are constantly making headlines. It seems like the electronic world we know is under constant attack. These attacks can cost millions, even billions in lost revenue, leaked information, and productivity. Cybersecurity - it's top of mind for every organization. When it comes to providing SECURE access to desktops, applications and data Citrix can help. Watch this video and we'll show you how.
  • Restore data after ransomware attack
    Source: Citrix Systems
    Webcast: Ransomware attacks are far more than an inconvenience. They can be costly, and literally bring business operations to a halt. That's something that's been well documented in the news headlines... big companies... unfortunately attacked and finding their critical data held for ransom. But with Citrix ShareFile, there's a way to roll back the clock, to the way things were before the attack. Watch this video and we'll show you how.
  • Protect against zero day threats and malware video
    Source: Citrix Systems
    Webcast: Ransomware, phishing attacks, and zero day exploits are the biggest nightmares facing IT today. You've seen it in the headlines, hackers targeting organizations, with all kinds of malware designed to not only steal sensitive data, but to encrypt it and hold it for ransom. But Citrix can help stop these attacks on day zero. Watch this video and we'll show you how.
  • Securely deliver apps and desktops to any enterprise, from any cloud
    Source: Citrix Systems
    Webcast: Around the globe, people work from just about everywhere. And for organizations, those workers are often a mix of contractors, and employees. For IT, maintaining security with user identity, can be a challenge. How do you securely deliver applications, data, and desktops to workers, without putting your intellectual property at risk? Can you leverage cloud resources like Office 365 and Azure AD? Absolutely. And Citrix brings it all together, with security being top of mind. Watch this video and we'll show you how.
  • Maintain control of documents and files you share with others
    Source: Citrix Systems
    Webcast: It's something we do all the time. Sending a file to someone else, sharing data. But what happens when you press send on that email? The file attachment is gone and out of of your control. You have no idea where it could end up, or who could access it. That's where Citrix ShareFile can help. Watch this video and we'll show you how.
  • How Box Platform is Creating Digital Experiences for Insurance Customers
    Source: Box
    Webcast: Thursday, April 26, 2018 | 10:00 AM PT; 1:00 PM ET

    Is your organization undergoing a digital transformation?
    Insurance companies are finding themselves in the crosshairs of digitization as customer expectation continues to rise year after year. With newcomers leveraging best-in-breed cloud services to get ahead of the game, industry incumbents are realizing that they too need to do the same in order to ensure that they too can create unique experiences that differentiate them from your competitors. Since content plays a heavy role in every insurance process, Box is a natural fit to help these businesses reach those goals.

    Join this webinar to learn how Box Platform is playing a critical role in enabling digital transformation across insurance. In this webinar, we'll discuss:
    • Major trends that the insurance industry is facing today and what is creating the need for digital transformation.
    • Features and capabilities of Box Platform that enable you to build new digital experiences.
    • Use cases for Box Platform and how it can create a better experience for claim adjusters, claims officers, customers, and external parties.
    • How Box Platform can work with existing applications that your business may already be using today, to create efficient and streamlined processes.

    Whether your primary interest is to create new and innovative experiences for your customers or simply reduce costs in your existing insurance process, this session will give you a different perspective on how you can get there.

    About Box Platform
    Box Platform is a cloud content management platform that enables businesses of all sizes to build digital experiences with content for employees, partners, and customers. You can learn more at box.com/platform
  • Combating Account Takeover in the Digital Space
    Source: Sift Science
    Webcast: Ready or not, data breaches and account takeovers are on an exponential rise. Equifax, Yahoo, Uber, and Saks Fifth Ave, just to name a few. This type of malicious behavior can not only turn away loyal customers but also cause severe erosion of brand reputation. What can companies do to protect themselves and their users from this malicious behavior?

    In this webinar, you'll learn:
    *How prevalent data breaches and account takeovers are
    *Understand the impacts that these breaches can have on user trust
    *How to effectively fight and mitigate against this type of behavior
  • How to Deliver the Best Skype for Business User Experience Over Any WAN
    Source: Infovista
    Webcast: For most organizations, Unified communications (UC) is a critical component of their digital transformation. Watch this video to learn how Ipanema, InfoVista's Application Aware SD-WAN can help you guarantee smooth collaboration and deliver the best possible user experience by orchestrating Skype for Business performance over any WAN, dynamically and in real-time.
  • Ensure the best possible user experience when migrating to Microsoft Office 365
    Source: Infovista
    Webcast: Migration to Office 365 presents many challenges for IT organizations because, of the business-aligned application performance requirements in line with business objectives. Watch this video to learn how Ipanema, the Application Aware SD-WAN from InfoVista, can help you ensure fast, efficient migration to Office 365, while delivering the best possible user experience.
  • The Best Way to Maximize Application User Experience over Hybrid WAN
    Source: Infovista
    Webcast: Delivering flawless application user experience over complex hybrid WAN architectures is a challenging task for all businesses and IT teams. Ipanema, the Application Aware SD-WAN from InfoVista, allows you to easily deploy and operate your Hybrid WAN and deliver the consistent user experience your business demands!
  • Digital Transformation and Modern App Factory
    Source: Progress Kinvey
    Webcast: Highly responsive applications are the foundation of a successful digital transformation, leading to better business processes, increased sales and deeper customer engagement.

    Join Forbes contributor and industry analyst Maribel Lopez, to see how market leaders are redesigning their existing apps and processes for a mobile, cloud-native world. She discusses how a Modern App Factory speeds both development and updates for apps that lead the industry in user adoption and engagement.

    In this webinar, we discussed:

    • How to decrease the time it takes to develop and update
    • How to improve adoption and engagement by delivering better performing apps
    • How to reduce the cost and complexity of mobilizing enterprise data

Results 1 - 15 of 63