All Webcasts

Resources available: 209

Lunch Seminar: Best Practices to Build Elastic, Automated Networks

Join us for a special seminar. Featuring practical insight from Citrix, our discussion will focus on five best practices for building next-generation elastic and automated networks using NetScaler integration with Cisco Nexus.

APTs: They're advanced and persistent but they are not malware!

During this webinar, industry experts will talk about advanced threats, discuss a broad-spectrum approach to advanced threat defense and how to gain visibility over the entire threat life cycle.

Next-Gen Solutions For Physical and Virtual Desktops

Watch this webcast to see a comparison of traditional approaches to next-gen technology in delivering and deploying applications.

May 7, 2014 - LIVE AT 9:53 AM PT

LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.

Traditional backup is going away, but where does this leave end-users?

Test Driving Big Data with a Proof of Concept

Tune in to this webcast from Collaborative Consulting and IDG to learn how to launch a big data proof-of-concept at your organization.

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Mobile Security: Containerizing Enterprise Data

In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM.

Endpoint Data Management: Protecting the Perimeter of the Internet of Things

Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it.

How to Protect Enterprise Data Yet Enable Secure Access for End Users

Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and steps for better protecting enterprise data while providing end users with secure data access.

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

©1994-2014 Infoworld, Inc.