Infosecurity Multimedia

(View All Report Types)
Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

Podcast: The challenges of managing mobile devices across a corporate IT environment
sponsored by BlackBerry
PODCAST: This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
Posted: 31 Oct 2013 | Premiered: Oct 31, 2013

BlackBerry

NetIQ Security Solutions for iSeries Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM

Ensuring VoIP Quality of Service
sponsored by SUSE
WEBCAST: Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
Posted: 09 Aug 2006 | Premiered: May 24, 2006

SUSE

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Sophos Email Security Appliances
sponsored by Sophos
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos