Webcasts

  • LIVE TODAY

    Containerization Options: How to Choose the Best DLP Solution for Your Organization

    Topic:
    Mobile & Wireless, Networking, Security

    This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of the five key Data Leak Prevention solutions.

    View Now
  • ON DEMAND

    Beyond Compliance: Combating Threats with Endpoint Configuration Management

    Topic:
    Data Protection, Security

    Randy will discuss the need for status visibility and reporting. In addition, there are many areas that group policy does not address; he'll provide multiple examples of commands and configuration tweaks commonly required to secure endpoints.

    View Now
  • LIVE TODAY

    Securing Mobile Devices with Citrix XenMobile MDM

    Topic:
    Mobile & Wireless, Security

    In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.

    View Now
  • LIVE TODAY

    Secure Mobile Email Users Will Love

    Topic:
    Data Protection, Mobile & Wireless, Security

    Maintain full control over sensitive corporate data

    View Now
  • ON DEMAND

    Step Up to the IT Security Challenge

    Topic:
    Data Protection, Security

    Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers.

    View Now
  • ON DEMAND

    Webinar: IBM IIM for Fraud, Abuse and Waste in Government

    Topic:
    Data Protection, Security

    View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization.

    View Now
  • ON DEMAND

    IBM Intelligent Investigation Manager: Online Product Demo

    Topic:
    Data Protection, Security

    Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations.

    View Now
  • ON DEMAND

    Fighting Fraud Videos: IBM Intelligent Investigation Manager

    Topic:
    Disaster Recovery, Security

    Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space.

    View Now
  • ON DEMAND

    Webroot System Analyzer

    Topic:
    Application Management, Security

    Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications-in less than 2 minutes.

    View Now
  • ON DEMAND

    Solved Video: Mobile Security

    Topic:
    Mobile & Wireless, Security

    Ziyad Roumaya, Solution Architect, talks about how a Mobile Security solution helped to solve a customers business problems.

    View Now