All Webcasts

Resources available: 256

Why more decision makers purchase SaaS solutions

See how trends in software as a service are growing as line of business owners move toward cloud and SaaS solutions for their teams.

How Organizations Manage Cloud and SaaS

See how trends in cloud migration with software as a service, SaaS, can increase user and IT administrator productivity, simplify management and contain costs.

What if IT Teams Worked Together in the Cloud?

See how to bring IT and developers together so your organization can harness the full potential of cloud computing. Join Dell and Gigaom Research for this roundtable webcast that features top industry analysts.

Identity and Access Management for Your Clouds

Explore the challenges of securely deploying applications to your cloud, and find out how to address these issues in this informative webcast.

Answering the Tough Question: Who Has Access to What?

Frustrated with user permission issues? Concerned about security threats? Learn how to efficiently assess and document permission assignments in this webcast.

Limit the Damage from a Data Breach by Planning Ahead

Watch this informative webcast to find out how to develop a data breach response plan, identify the key members of a response team and put together a data breach timeline. Plus, hear about the top five questions asked in a data breach.

What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets

Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center managers know what interactions to prioritize.

Princess Cruises collaborates across the globe in the IBM cloud

This video explains how IBM and the Cloud helped the company rapidly scale its infrastructure and respond to the growing need to collaborate across their globally diverse enterprise.

Keep Servers Up and Running and Attackers in the Dark

An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of this asymmetric workload. Watch this video to learn how to easily mitigate these attacks.

On Demand: Mastering the Art of Mobile Content Management

Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their content anywhere, anytime, while ensuring interoperability, security, control, and scalability for IT.

©1994-2014 Infoworld, Inc.