All Webcasts

Resources available: 215
ON DEMAND

A Holistic Approach to Compliance Makes Business Sense

Too often, companies consider compliance a check-box project rather than a strategic process. IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value.

ON DEMAND

Virtualize SQL on VMware with Confidence: What You Should Know and How to Get Started

View this on-demand Webcast and hear how Rick Scherer from San Diego Data Processing Corporation overcame server sprawl by successfully implementing SQL Server® on VMware®.

ON DEMAND

10x Lower Disaster Recovery Costs: Cost-effective business continuity that spans from server to storage

View this on-demand Webcast and hear Jared Wray from Tier 3 discuss how his company shortened backups from 24 hours to one hour, slashed restores from three days to one hour, and delivers disaster recovery services at 10 times less cost with NetApp® and VMware®.

ON DEMAND

DLP Realities: Data Loss Prevention in Practice

With so many large scale data breaches making headlines, it's no wonder that Data Loss Prevention continues to be a top concern of IT Managers and much hyped solutions continue to be top sellers in the IT security solutions market. View this webcast to learn more!

Data Management

ON DEMAND

Sybase Mobile University Online Courses

Get up to speed on the latest mobile application developments and learn how to overcome common pitfalls. Topics include Mobile Application Platforms, Going Wireless, Platform Power and Safety Matters.

ON DEMAND

Defending against Web 2.0 and Browser Hacks & Attacks Can SaaS Web Security Deliver Higher Protection & Lower Cost?

Gartner’s Peter Firstbrook discusses how to reduce business risk and save budget through SaaS Web security.

ON DEMAND

How Browser Exploits Lead to Web 2.0 Hacking Defending Against the New Threats with Cloud Delivered Security

Are you ready to trust the cloud for Web 2.0 security? IDC’s Brian Burke discusses whether cloud delivered security is right for your organization.

ON DEMAND

Newer Threats and Newer Defenses against Web 2.0 How Hackers Exploit Browsers & Active Content

Join Peter Firsbrook, Research Director at Gartner to learn how to protect dynamic and user-generated content, how to deal with road warriors and smart phone users whose access to the Internet often bypasses all security controls and many more Web 2.0 challenges.

ON DEMAND

Risks and Defenses Against Web 2.0 Threats Cut your URL Filtering cost in Half and Double your Web Security

Join Forrester’s Chenxi Wang, for this educational webcast on cloud security.

ON DEMAND

The Attacker Within: How Hackers are Targeting Enterprises from the Inside-Out – Comprehensive Approach to Web Security

Join IDC’s Brian Burke to learn how to address these issues and discuss the pros and cons of cloud security services.

©1994-2014 Infoworld, Inc.