October 2014- In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!
Join a Fortune 100, Box, and partner Skyhigh Networks for a discussion on how we advise our customers through this decision and present a framework for improving your security today. In this webinar, you can expect to learn:
- How born-in-the-cloud solutions like Box and Skyhigh Networks help you extend security to the cloud
- A framework for evaluating cloud solutions on critical security capabilities
- And, three things you can do ...
September 2014- To be successful in today's increasingly competitive and uncertain business world, best-in-class organizations focus on process improvement to increase productivity, lower costs, improve customer experience, and gain competitive advantage. Until now, these initiatives have required considerable manual effort for process investigation, and companies have been unable to effectively visualize key processes across the enterprise silos. Overcoming these challenges requires powerful data collection and analytical tools to gain insight into business processes, systems and data, and ...
September 2014- This on-demand webinar focuses on the public sector benefits of building a solid information governance foundation within agencies. A proper foundation will not only help manage the lifecycle and growth of data, it alsoΒ
August 2014- Whether it's a HIPAA/HITECH, Sarbanes Oxley, Gramm-Leach-Bliley violation, or a State breach notification law, data breaches have substantial legal and financial consequences, regardless of industry. All it takes is a single security lapse and the next thing you know, you're trending on Twitter (and not in a good way), and your CEO is resigning. It doesn't have to be this way.
April 2014- In this webinar learn how you can stay a step ahead of security threats through a comprehensive approach to threat protection. See a demo of the malware analysis appliance, next-generation sandboxing solution.
March 2014- Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches
March 2014- You've probably been hearing plenty about the threat of DDoS attacks-and how more attackers are targeting DNS. Watch this short video and hear Neustar's Rodney Joffe explain how hardened DNS can keep your business safe.
Fiction: Moving voice to the cloud will reduce my voice quality and give me less control.
Fact: Hosted PBX services actually give me increased control, security, flexibility, scalability, and voice quality. I also get complete business continuity protection and future-proofing that premise-based solutions will never be able to provide.
In this webinar find out how new business-grade Hosted PBX solutions are a world apart from Internet-based "over-the-top" hosted solutions, offering businesses of all ...
Learn how to enable applications safely.
Find out how to identify and control users regardless of IP address, location, or device.
Get the facts on protecting against known and unknown application-borne threats.
November 2013- This GigaOM Research webinar:- Examines why early adopters have found success with OpenStack deployments. - Explores ways in which OpenStack vendors can address the concerns of other industries.- Provides a how-to guide for enterprises looking to adopt OpenStack.
Enterprises are losing the battle against advanced, information-stealing malware attacks. We continuously discover new application vulnerabilities which are quickly exploited by cybercriminals. Traditional blacklisting solutions don't work, and more advanced whitelisting-solutions are unmanageable. How do you overcome the manageability and operational challenges of advanced malware protection?
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced ...
October 2013- GigaOM's research analyst Mark Leary and Silver Peak's virtualization and cloud expert, Vivian Xu, discuss the benefits of a SDN (Software-Defined Network). See how industry leaders are leveraging SDN principles to that overcome the challenges of moving data across distance and create more flexibility.
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances.
Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can:
Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X
Reduce bandwidth costs and extend replication distances
Lower storage costs while increasing storage flexibility<...
Employees working from mobile devices is an increasing challenge for enterprise IT, often driving a bigger wedge between employee expectations and IT deliverables. As a result, those of us in the IT trenches need to understand and embrace enterprise mobility management (EMM) concepts, including mobile device management (MDM), mobile application management (MAM) and Bring Your Own Device (BYOD).
Transport for London's Jon Miller, head of mobility, digital asset management and the project management ...
With Apple-ization, IT consumerization and BYOD comes an increase in security threats and a constantly changing threat landscape. Today's IT pros need to understand how cybercriminals target end-user devices and how to combat anything that threatens the critical data within the enterprise.
In this on-demand webinar, Sophos security expert John Shier explores how malware threats work, what you can do to protect your enterprise and users, and how other enterprise IT teams tackle ...
Enterprises across multiple industries are now adopting mobile strategies and running mission critical services through mobile devices and apps.
In order to be successful, however, organizations must plan their mobile development and operation practices to ensure optimal app performance.
Watch the recording featuring guest speaker Jeffrey Hammond, Forrester Research, Inc. VP and Principal Analyst and Andrew Levy, CEO of Crittercism to learn the best practices to delivering world class mobile apps.<...
Users of a new generation of Wi-Fi enabled devices will soon be demanding the network speeds promised by the 802.11ac standard for UC&C, HD video, cloud-based storage, and other bandwidth intensive applications.
During this webinar, you will learn:
The benefits of 802.11ac and how the new standard delivers gigabit-per-second speeds
Key factors and applications driving adoption of Gigabit Wi-Fi
Things to consider when migrating your network ...
Corporate adoption of tablets and smartphones poses new challenges for IT admins in the quest to offer enterprise management capabilities. New machine deployment, software updates, new software distribution and issue resolution all play a part in successful client management.
For Tim Winningham at The Ohio State University, these tasks and more are a walk in the quad. Listen on-demand as he explains how implementing a client management strategy not only overcomes common Apple-ization ...
Let's face it, users store business data on laptops and desktops, even if they're not supposed to. And mission-critical data-including sensitive, executive-level information-exists exclusively on these endpoint devices.
IT organizations unprepared to provide easy-to-use, easy-to-administer, cross-platform endpoint backup and restore are at risk for needless data loss and IT management nightmares.
Luckily, there's a way to quickly and easily protect endpoint data. Available now as an on-demand webinar, you can hear ...
An evolution of the burgeoning consumerization of IT and Bring Your Own Device (BYOD) trends, "Apple-ization" refers to the continued-and often user-led-introduction of intuitive, user-friendly, Apple-like technologies into the enterprise.
For today's hyper-connected, always-tethered employees, the notion of acceptable information technology is as much about the experience as it is about business productivity. With the lines between home and office continuing to blur, employees choose devices reflecting their personal-rather than their professional-identities.
Every day developers are tasked with creating impossible applications with complicated requirements and expected to deliver results in a short amount of time.
Join us to understand why BIRT should be an integral part of your data visualization development environment. We will show you how to build "cool" content quickly so you can free up cycles to meet all of your application's requirements for presenting structured and unstructured data over the web and ...
May 2013- This white paper explores the three primary ways that MDM solutions fail to protect organizations and how these inadequacies leave corporate networks and users vulnerable to today's critical threats.
Supporting dozens of clients is easy, supporting hundreds or thousands, not so much. The difference between good enough wireless and great wireless is defined by- unhappy visitors, frustrated exhibitors, lost ability to monetize services and maybe the worst - dissatisfaction of services broadcasted through social media. In other words: because convention centers are such visible venues, running a basic (non-optimized) Wi-Fi network is bad for business.
This webinar will identify the components and ...
May 2013- While spreadsheets are widely used for statistical analysis, they are useful only to a certain point. When used for a task they're not designed to perform, or for a task beyond the limit of their capabilities, using spreadsheets can be risky. Read this paper to learn about more powerful yet easy-to-use analytics alternatives that may be more suitable.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services