Webcasts

Security webcasts and data protection videos for implementing best practice security strategies.

Podcast: InfoSphere Optim Query Capture and Replay - Best Practices with IBM Fellow, Curt Cotner

Source: IBM

Listen to IBM Fellow, VP & CTO, Curt Cotner, discuss his latest project, InfoSphere Optim Query Capture and Replay. Curt will discuss key business and technical drivers behind this exciting new solution and how Query Capture and Replay fits into the larger InfoSphere Optim tools portfolio. Finally, Curt will share his experiences from IDUG 2012 and the reaction of clients to this new product announcement.

» View Webcast


Symantec is Data Loss Prevention

Source: CDW & Symantec

This video documents the importance of data loss prevention solutions. It touches upon the negative effects data breaches have on companies and how unified DLP solutions from Symantec can help locate confidential data, how this data is being used, and how to prevent its loss.

» View Webcast


Risk Appropriate Security for Evolving Threats Knowledge Vault

Source: ActivIdentity

With an ever-increasing amount of data in use beyond firewall perimeters and with an ever-widening array of external users seeking network access, it's not surprising that serious concerns about authentication have arisen. Securing the mobile world is a major priority, as is protecting against sophisticated attacks like advanced persistent threats. This Knowledge Vault is a veritable treasure trove of information in a variety of formats, all designed to help you develop a security and authorization strategy to stand up to today's threat environment.

» View Webcast


Mobilizing Your Collaboration Strategy

Source: Box

A project-based approach to dealing with mobility and BYOD issues will leave organizations (and their CIOs) in the dust. In this Webcast Forrester shares their latest research on what's really happening with mobile device use. Their forecasts make it clear that mobility must be a top priority for IT organizations regardless of their size. Learn how you can leverage the cloud to ensure users can simply collaborate and share content regardless of their device or location.

» View Webcast


Transforming IT to a Business Service Orientation

Source: CA Technologies

With increased end-user demands and shrinking IT budgets, it is critical for IT execs to understand and adopt critical success factors to effectively optimize IT. Watch CA Technologies explore the best practices to enable this shift in IT management to thrive in this era of IT's "New Normal".

» View Webcast


CA APM and CA APM Cloud Monitor

Source: CA Technologies

CA Technologies Application Performance Management (CA APM) provides advanced application and infrastructure monitoring to ensure optimal business service performance. Watch this flash demo to see how CA APM enables IT operations and line of business owners to reduce revenue risks and keep customers loyal.

» View Webcast


CA Service Operation Insight

Source: CA Technologies

See how a VP of Operations and his team have improved their ability to quickly respond to incidents that impact or pose risks to the quality and availability of their critical online business services.

» View Webcast


Are Security Breaches Threatening Your Brand?

Source: Coverity

Live Date: Wednesday, September 19, 2012, 11:00 AM EDT

According to a July 2012 commissioned study conducted by Forrester Consulting on behalf of Coverity, the biggest impact of a security breach is damage to professional reputation or job. Beyond headline events, security breaches are personal and your brand is at stake.

Join guest speaker Chenxi Wang of Forrester Research, Inc., and Kristin Brennan of Coverity, as they discuss the key findings of the study and specific steps you can take to reduce your risk of security breaches.

In this webinar you will learn:
-The impact of security breaches on a business and the key areas of risk
-The relationship between application security maturity and security incidents
-The barriers to effective application security adoption
-Strategies for effectively addressing security across the lifecycle and measuring the value

» View Webcast


WHITE PAPER
Reduce Email Archives up to 60%

spacer Are you considering implementing a proactive archiving and eDiscovery solutions? This paper summarizes 15 separate soft cost savings when implementing Symantec Enterprise Vault and the Clearwell eDiscovery Platform.

» Learn More

WHITE PAPER
Aberdeen Report: To Patch, or Not to Patch? (Not If, But How)

spacer The report explores the correlation between the current use of patch management and the level of endpoint-related risk that companies are effectively accepting.

» Learn More

EDITOR'S PICKS
Dirty Tricks: Social Engineers' Favorite Pickup Lines
Tabletop Exercises: 3 Sample Scenarios
19 Ways to Build Physical Security Into Your Data Center
White Papers

Malware Analysis Benefits Incident Response

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.