All Webcasts

Resources available: 205

Sunnybrook Discontinues Paper-based Policies and Procedures

Sunnybrook Health Sciences Center relied on the Google Sharepoint Connector to access a wealth of information stored within different Microsoft Sharepoint Portals. Access to this stored information enabled Sunnybrook to discontinue paper-based policies and procedures altogether.

Bring Fast, Relevant Search To Your Organization

Google Search Appliance makes searching your company's information as easy as searching Google.com itself. Indexing more than 220 different file types (HTML, PDF, DOC, XLS, etc.), GSA provides secure, universal search across your intranet, portals, file shares, databases and business applications to bring you fast results that are both accurate and relevant. Watch this video.

Securing your Web and Data With One Console

Protect your organization's use of today's dynamic Web and prevent data loss while reducing costs and complexity. Websense® Web Security Gateway Anywhere combines the power of on-premise deployment with the flexibility of Security-as-a-Service (SaaS).

The Smart Route to Windows 7

Join IDC analyst Al Gillen as he presents findings from "Windows 7 Done Right: Efficiency from Migration to Implementation" to demonstrate how planning and using the right tools can dramatically improve the Windows 7 environment, reduce security and backup concerns and automate the migration process.

Data loss prevention

InfoWorld contributing editor Roger Grimes explains the technologies and best practices you need to keep sensitive data safe within your enterprise's boundaries - and ensure only authorized employees gain access.

A Brief History of Malware

Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites or from bots that reside on your own corporate network. Dr. Thomas Chimento of Webroot® Web Security Service will review the evolution of with specific emphasis on the directions that malware is likely to take over the next few years.

Are your PCs and Laptops Recovery and Discovery Ready?

Please join IDC Program Vice President Laura DuBois to find out why corporations are quickly adopting a centralized PC Backup and Protection strategy to mitigate their risks from data loss. More importantly, customers gain visibility and accessibility to critical data across the network in order to meet legal and regulatory mandates and be prepared for eDiscovery requirements.

This webcast will examine the critical reasons why corporate PC data loss should be taken quite seriously, particularly as it relates to the recovery and discovery of critical "need-to-have" business information PLUS successful methods employed to achieve complete control over enterprise PCs and laptops before data loss happens.

ON DEMAND

Virtualization @ the speed of business

Three different kinds of organizations all took very aggressive approaches to virtualization, each in search of greater agility and competitive advantage. They got that and a lot more, as you will hear directly from the CIOs that oversaw these efforts.

ON DEMAND

Desktop virtualization keys innovation drive

This business process management leader sought to develop a next-gen desktop computing service to drive innovation. In doing so, Genpact reduced TCO of desktops by one third while deploying fully compliant, virtualized desktops securely and boosting user productivity.

ON DEMAND

Guiding iPhone into the business world

Apart from being a very cool device, the iPhone can serve as a powerful business tool whose ease of use makes it a crowd favorite among end users. This legal services firm partnered with Citrix to carefully manage the iPhone into mainstream business applications.

©1994-2014 Infoworld, Inc.