Webinar Replays

Recorded On: May 23, 2013

Big Data: Challenges and Strategies

How are you handling your company's data? We address that question during this webinar Big Data: Challenges and Strategies with William Hurley, Chief Technology Officer, Westcon Group, Inc. Read More ›

Filed under: Webinar Replays

Recorded On: May 22, 2013

Avoiding a BYOD Hangover

Using Network Based Security to Enable Secure BYOD Organizations are under increasing regulatory and competitive pressure to increase the security around confidential information while also struggling to implement new initiatives around mobility and BYOD. Most CIOs are struggling to satisfy the wide range of requirements coming from employees and regulators while keeping costs in check. Watch this webinar to learn about the importance of choosing a vendor that provides an overarching security platform, not just point products. You'll also learn how a consolidated solution can securely enable the latest IT initiatives and allow for a comprehensive, unified policy for... Read More ›

Filed under: Webinar Replays

Recorded On: May 8, 2013

Deny Hackers with Deception

73% of all Enterprises have been hacked in the last 2 years thru insecure Web Applications The First Web Intrusion Deception System – No False Positives! Juniper Networks® Junos® WebApp Secure is a Web Intrusion Deception system that does not generate false positives because it uses deceptive tar traps to detect attackers with absolute certainty. Junos WebApp Secure inserts detection points into the code and creates a random and variable minefield all over the Web application. These detection points allow you to detect attackers during the reconnaissance phase of the attack, before they have successfully established an attack vector. Attackers... Read More ›

Filed under: Webinar Replays

Recorded On: April 24, 2013

Extreme Networks Identity Manager Helps you Get Control of your Network

Today’s Network Requires More Visibility and Control The IT and network organizations within enterprises are challenged more than ever to serve users with a diverse set of application and network access requirements based on user or device profiles, location, and presence. The need for the network to understand user and device "presence," as well as location "awareness" from an identity-oriented approach has become critical as organizational changes rapidly occur and as the workforce becomes more agile. The Solution: User, Device, Location and Presence Awareness Extreme Networks Identity Manager, with the ExtremeXOS® modular operating system and Ridgeline™... Read More ›

Filed under: Webinar Replays

Recorded On: March 27, 2013

Reducing Hospital Readmissions Using Innovative Collaborative Video Solutions

Accountable Care: The Role of Video Collaboration in Solving Today’s Healthcare Challenges Healthcare organizations the world over are turning to Polycom video collaboration solutions to improve care and reduce cost. Collaborative healthcare solutions from Polycom enable patient centered care, multi-disciplinary team support, reduction of unnecessary re-hospitalizations, and collaboration across the entire healthcare team independent of physical barriers. There are many reasons why eight of the top 10 hospitals and the top ten pharmaceutical companies worldwide are Polycom customers. Join us for a webinar to gain a better understanding of how collaborative video solutions address the following healthcare challenges: Creating... Read More ›

Filed under: Webinar Replays

Recorded On: February 6, 2013

Achieving Meaningful Security In Healthcare Environments

Watch this webinar replay and learn how you can implement new IT initiatives for mobility while keeping costs in check and meeting regulations requirements. Read More ›

Filed under: Webinar Replays

Page 6 of 9 pages