All Webcasts

Resources available: 208

Is This My Cloud?

Find out how to determine who will be using the cloud, and how involving those users in the cloud planning and design process will ensure the end result is what they need.

Starting Right with Virtualization

With the benefits of this technology becoming ever more clear, virtualization is enjoying a boom in popularity among companies of all sizes. Get to know the applications that best submit to virtualization and the best solutions to optimize the virtualized infrastructure in this white paper from Dell and VMware.

TiVo Reduces Call Center Costs

Implementing the Google Search Appliance not only reduced the amount of time TiVo's Customer Support Agents spent searching for content, it also reduced time spent on the phone with customers, ultimately leading to reduced call center costs.

Sunnybrook Discontinues Paper-based Policies and Procedures

Sunnybrook Health Sciences Center relied on the Google Sharepoint Connector to access a wealth of information stored within different Microsoft Sharepoint Portals. Access to this stored information enabled Sunnybrook to discontinue paper-based policies and procedures altogether.

Bring Fast, Relevant Search To Your Organization

Google Search Appliance makes searching your company's information as easy as searching Google.com itself. Indexing more than 220 different file types (HTML, PDF, DOC, XLS, etc.), GSA provides secure, universal search across your intranet, portals, file shares, databases and business applications to bring you fast results that are both accurate and relevant. Watch this video.

Securing your Web and Data With One Console

Protect your organization's use of today's dynamic Web and prevent data loss while reducing costs and complexity. Websense® Web Security Gateway Anywhere combines the power of on-premise deployment with the flexibility of Security-as-a-Service (SaaS).

The Smart Route to Windows 7

Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process.

Data loss prevention

InfoWorld contributing editor Roger Grimes explains the technologies and best practices you need to keep sensitive data safe within your enterprise's boundaries - and ensure only authorized employees gain access.

A Brief History of Malware

Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites or from bots that reside on your own corporate network. Dr. Thomas Chimento of Webroot® Web Security Service will review the evolution of with specific emphasis on the directions that malware is likely to take over the next few years.

Are your PCs and Laptops Recovery and Discovery Ready?

Please join IDC Program Vice President Laura DuBois to find out why corporations are quickly adopting a centralized PC Backup and Protection strategy to mitigate their risks from data loss. More importantly, customers gain visibility and accessibility to critical data across the network in order to meet legal and regulatory mandates and be prepared for eDiscovery requirements.

This webcast will examine the critical reasons why corporate PC data loss should be taken quite seriously, particularly as it relates to the recovery and discovery of critical "need-to-have" business information PLUS successful methods employed to achieve complete control over enterprise PCs and laptops before data loss happens.

©1994-2014 Infoworld, Inc.