Webcasts
Security webcasts and data protection videos for implementing best practice security strategies.
Podcast: InfoSphere Optim Query Capture and Replay - Best Practices with IBM Fellow, Curt Cotner
Source: IBM
Listen to IBM Fellow, VP & CTO, Curt Cotner, discuss his latest project, InfoSphere Optim Query Capture and Replay. Curt will discuss key business and technical drivers behind this exciting new solution and how Query Capture and Replay fits into the larger InfoSphere Optim tools portfolio. Finally, Curt will share his experiences from IDUG 2012 and the reaction of clients to this new product announcement.
» View Webcast
Symantec is Data Loss Prevention
Source: CDW & Symantec
This video documents the importance of data loss prevention solutions. It touches upon the negative effects data breaches have on companies and how unified DLP solutions from Symantec can help locate confidential data, how this data is being used, and how to prevent its loss.
» View Webcast
Risk Appropriate Security for Evolving Threats Knowledge Vault
Source: ActivIdentity
With an ever-increasing amount of data in use beyond firewall perimeters and with an ever-widening array of external users seeking network access, it's not surprising that serious concerns about authentication have arisen. Securing the mobile world is a major priority, as is protecting against sophisticated attacks like advanced persistent threats. This Knowledge Vault is a veritable treasure trove of information in a variety of formats, all designed to help you develop a security and authorization strategy to stand up to today's threat environment.
» View Webcast
Mobilizing Your Collaboration Strategy
Source: Box
A project-based approach to dealing with mobility and BYOD issues will leave organizations (and their CIOs) in the dust. In this Webcast Forrester shares their latest research on what's really happening with mobile device use. Their forecasts make it clear that mobility must be a top priority for IT organizations regardless of their size. Learn how you can leverage the cloud to ensure users can simply collaborate and share content regardless of their device or location.
» View Webcast
Transforming IT to a Business Service Orientation
Source: CA Technologies
With increased end-user demands and shrinking IT budgets, it is critical for IT execs to understand and adopt critical success factors to effectively optimize IT. Watch CA Technologies explore the best practices to enable this shift in IT management to thrive in this era of IT's "New Normal".
» View Webcast
CA APM and CA APM Cloud Monitor
Source: CA Technologies
CA Technologies Application Performance Management (CA APM) provides advanced application and infrastructure monitoring to ensure optimal business service performance. Watch this flash demo to see how CA APM enables IT operations and line of business owners to reduce revenue risks and keep customers loyal.
» View Webcast
CA Service Operation Insight
Source: CA Technologies
See how a VP of Operations and his team have improved their ability to quickly respond to incidents that impact or pose risks to the quality and availability of their critical online business services.
» View Webcast
Are Security Breaches Threatening Your Brand?
Source: Coverity
Live Date: Wednesday, September 19, 2012, 11:00 AM EDT
According to a July 2012 commissioned study conducted by Forrester Consulting on behalf of Coverity, the biggest impact of a security breach is damage to professional reputation or job. Beyond headline events, security breaches are personal and your brand is at stake.
Join guest speaker Chenxi Wang of Forrester Research, Inc., and Kristin Brennan of Coverity, as they discuss the key findings of the study and specific steps you can take to reduce your risk of security breaches.
In this webinar you will learn:
-The impact of security breaches on a business and the key areas of risk
-The relationship between application security maturity and security incidents
-The barriers to effective application security adoption
-Strategies for effectively addressing security across the lifecycle and measuring the value
» View Webcast
Reduce Email Archives up to 60%
Are you considering implementing a proactive archiving and eDiscovery solutions? This paper summarizes 15 separate soft cost savings when implementing Symantec Enterprise Vault and the Clearwell eDiscovery Platform.
» Learn More
Aberdeen Report: To Patch, or Not to Patch? (Not If, But How)
The report explores the correlation between the current use of patch management and the level of endpoint-related risk that companies are effectively accepting.
» Learn More