Skip Links

Network World

Resource Library

  • Why better mainframe security management can help your business.
    Source: IBM
    Webcast: Administration can be a complex world where security is concerned. The resources spent on administration, management, auditing and compliance can be considerable. Watch the demo, "Using IBM Tivoli Security Management for z/OS," and see how IBM® can help you protect your business-simply, efficiently and more effectively.
  • Why Phones Displace Security Tokens As Authentication Device of Choice
    Source: PhoneFactor
    Webcast: Escalating IT security threats and strengthening regulatory requirements are driving adoption of multi-factor authentication to unprecedented levels. Increasingly, new and expanded multi-factor implementations are leveraging phone-based authentication instead of security tokens, which had previously dominated the multi-factor market. According to a leading analyst firm, phone-based authentication will dominate the multi-factor authentication market by the year 2014. This webcast examines key drivers for the market shift to phone-based authentication, including security, ease of use, and cost savings. It also presents real-world case studies from leading organizations that have made the switch to phone-based authentication.
  • Is Bob WFH today? Best practices to secure your remote users.
    Source: Webroot
    Webcast: Date: June 2, 2011
    Time: 1:00pm EST

    The good news is that your employees want to be able to work at any time of the day or night. The bad news is that they are using remote access methods that may introduce new threats to your corporate systems.

    Many companies are realizing that denying access to these disparate devices and convenient wireless networks is simply no longer an option. How can you build a security strategy and policy that allows the use of these mobile modes of access -- without opening up your data to new methods of leak or attack?

    In this webinar, we'll discuss best practices to secure your remote users:

    * The potential threats introduced by remote access, that you need to be aware of
    * Best practices for threat mitigation
    * Case studies on how customers solved their challenges
  • Secure DNS with BIG-IP v10.1 DNSSEC
    Source: F5 Networks
    Webcast: Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC) on F5 BIG-IP v10.1
  • BIG-IP GTM v10.1 DNSSEC In Five Easy Steps
    Source: F5 Networks
    Webcast: In this Video Webinar, Peter Silva talks with F5's Sr. Field Systems Engineer, Michael Falkenrath about the new BIG-IP GTM v10.1 DNSSEC feature. They take us through the basics of DNSSEC and GTM's ability to sign DNS requests on the fly. Watch how GTM is the industry's first and the only solution to secure your DNS infrastructure.
  • DNSSEC: Compliance is Easier Than You Think
    Source: F5 Networks
    Webcast: This webinar, conducted by some of the world's leading authorities on DNS security, will cover what is happening in the world of DNSSEC, including adoption trends, continuing challenges and a status update since the Kaminsky, Liu and Rose DNSSEC webinar held last year. Within minutes you'll be brought up to speed on DNSSEC threats, critical challenges and what your team can do to become compliant. Thanks to F5 and Infoblox, it's now easier than you think.
  • Secure Your Data Where it Lives
    Source: Oracle
    Webcast: Date/Time: June 15, 2011 10:00am PST/ 1:00pm EST

    WikiLeaks, Epsilon, TJX: Explosive headlines tell us that data leaks are common and dangerous. According to IDC, "Increasing Database security is one of the most efficient and cost effective measures an organization can take to prevent data leaks." Join this webcast to find out how to secure your data and make headlines inside your company - not in the press.
  • Encryption in the Public Cloud
    Source: TrendMicro
    Webcast: Listen in as Bob Bragdon discusses data privacy concerns with Dave Asprey, VP of Cloud Security at Trend Micro. Learn about the sixteen best practices you can implement today to secure your data within public cloud environments.
  • Blake Sutherland on Security and Compliance Challenges of Virtualization
    Source: TrendMicro
    Webcast: Get a preview of the anticipated requirements and an overview of virtualization security best practices from Trend Micro - a member of the PCI Virtualization Special Interest Group, and the leading vendor of virtualization security solutions. Blake Sutherland, compliance expert and Sr. Director of Strategic Markets will give you the insight you need to confidently virtualize your PCI cardholder data environment and beyond.
  • Addressing Cloud Computing Security Challenges
    Source: TrendMicro
    Webcast: In this podcast, Dave Asprey, VP of Cloud Computing at Trend Micro, discusses the unique security challenges that accompany private and public cloud computing. In addition, he offers advice on how companies can begin to evaluate their current cloud computing security efforts, reveals his number one security recommendation for cloud computing adopters and discusses which technology solutions he believes will make an impact on cloud security in 2011.