Security Infrastructure Multimedia
-
Keep Endpoint Data Safe
Sponsored by: Code42This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
IBM Intelligent Investigation Manager
Sponsored by: IBMView this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
-
Understanding Secure Work Space for iOS and Android Devices
Sponsored by: BlackBerryThis exclusive webcast examines how you can establish and maintain a secure workspace for mobile platforms such as Android and iOS.
-
Exposing the Beast - Custom API Mgt for the Enterprise
Sponsored by: Intel CorporationIn this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
-
Podcast: Security across your enterprise mobile devices: What you need to know
Sponsored by: BlackBerryThis exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.
-
Enhancing End-to-End Cloud Security: Part 3
Sponsored by: Intel SecurityThis brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.
-
Enhancing Security with Intel® Trusted Execution Technology
Sponsored by: Dell, Inc. and Intel®This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
-
A free Demonstration of Panda Cloud Systems Management
Sponsored by: Panda SecurityWatch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
-
The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security
Sponsored by: Colligo Networks Inc.In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise.
-
Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud
Sponsored by: IntelListen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.
-
Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
Sponsored by: IntelThis short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.
-
Videocast: Considerations for Choosing Cloud Backup Hosting Services
Sponsored by: KineticDCloud backup for physical and virtual environments is becoming more and more important for SMBs. Gartner predicts that by 2012, Vendor Lock-in will surpass security as the biggest obstacle to cloud computing. Vendors are trying to lock-in and maintain their customers forever, not allowing them the flexibility and mobility SMBs require.
-
Keep Your Enemies Closer - Get Proactive about Security
Sponsored by: AT&T CorpForrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
-
Video - Vulnerability Management in a Web 2.0 World
Sponsored by: LumensionLumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.