More cloud-security webcasts
With the looming April 8th 2014 end-of-support date for Windows XP, IT departments are working to wrap up the move to Windows 7 and Windows 8. Register today to secure your place in this timely exploration of ways to solve application-related migration challenges. Please forward this message to your peers as well. Jefferson Raley, Portfolio Director, EUC Strategic Consulting Practice, Dell Jefferson Raley has been helping customers with technology services for over 18 years. His tenure at Dell includes integrating customer requirements with manufacturing, managing End User Computing consulting services, and developing new software and technology to drive service efficiency. Jefferson currently manages a team developing innovative new services to help customers manage their End User Computing environments. close this window Philip Dakas, Director, Global Application Services, Dell Philip Dakas, Director, Global Application Services, Over 10 years of experience delivering technology solutions to support business processes in parallel with establishing global operations. Extensive experience in the Windows XP/7 application management space, currently leading a team of 250+ resources globally to deliver high volume, cost effective application projects to customers.
Dell™ KACE™ Management Appliances provide one of the largest patch repositories available, including patches for Windows and Mac operating systems, as well as for a wide range of applications. KACE saves organizations time and money by providing comprehensive and reliable patching, without the time, complexity and cost of traditional solutions.
Join systems management experts form Dell KACE in this live webinar for a quick look at the state of the service desk, and explore new requirements and tradeoffs in choosing and using a service desk solution. Then you’ll learn practical ways to ensure an effective service desk in 2013 and beyond.
Join us for an in-depth look at how your organization can use Windows Server 2012 to achieve business goals.
Join Dell SonicWALL to learn how advanced attacks work and what you can do to keep your organization safe.
The webcast will be facilitated by hands-on migration experts with one goal – to help you know exactly what to do for an orderly transition by next April – and how to go about it. They have been on-site with companies of all sizes, at all stages of migration – they will answer your questions live.
Register for this webcast now to learn how you can close a dangerous security loophole and add a fortified level of security against advanced persistent threats.
Register for this webinar to better understand how IT organizations are adopting, deploying, and managing the demand for big data analytics.
Join Kevin Whartenby of HP and Jason Mical of AccessData as they review new technological advancements that make holistic rapid detection and response a reality. Whartenby and Mical will discuss how organizations and more advanced service providers are filling detection, analysis and remediation gaps by integrating critical analysis capabilities, implementing a “virtual war room” environment to enable real-time collaboration, and leveraging bi-directional integration between an integrated rapid detection and response platform and SIEM solutions, such as ArcSight ESM.
Cloud Client Computing can create the BYOD flexibility users desire while providing the security and manageability required by the organization. Come learn how Cloud Client Computing solutions can help you with your end user computing strategy.
In this Webinar, Snapfish will also discuss their recommendation engine – powered by HP Vertica – that leverages the power of real-time analytics to deliver laser-targeted product recommendations based on how new site visitors and past customers have interacted with the Snapfish.com Web site.
OpenStack is a set of applications with many different deployment options. This webinar provides compelling insights and learnings from real life OpenStack deployments.
Join this free, insight-packed webinar to find out how you, too, can transform your company’s day-to-day business processes quickly, cost-effectively and without taking on a “boil the ocean” project.
Attend this webinar to learn how a purpose-built system for customer analytics is valuable when handling today’s big data challenges as you work to acquire, grow and retain customers.
Join us for a fact-based comparison that will illustrate how to meet Big Data Challenges with simplicity and speed to lower cost and optimize performance.
Attend to explore how COBOL has evolved to become a multiplatform language, and learn a way to make it more accessible for Big Data sourcing and integration with other environments.
Don’t miss out on an opportunity to gain a competitive edge through simplified business intelligence, big data analytics, and database management.
oin this presentation to discover how Pega can be leveraged to provide full insurance capability within your Salesforce.com environment. Register Now!
Attend to learn how IBM Cloud & Smarter Infrastructure solutions drive a unified service management approach across heterogeneous environments while enabling the foundation for the enterprise app store.
Almost every Cobol application can be enhanced to provide more capability. Attend this webinar to find out how you can make best use of Cobol in your environment.
Join IDC analyst Al Gillen as he explains the concept of a 3rd platform, and reviews the market trends that have brought us to the threshold of the next generation of computing.
Register for this webinar to learn ways to keep your company safe from both types of these insider threats.
The greatest potential for improvement comes from better understanding of our true information needs and in bringing more order to workplaces where disconnected processes and unstructured information have been the norm. This webinar will help you focus on gathering the right information and on the best processes to deliver it.
Register for this webinar to learn how to put data to work. Find out why the big buzz around big data is justified as Best-in-Class companies enjoy the benefits of behavior-based segmentation and targeting along with real-time offer management.
Join us for a series of short roundtable discussions to explore the opportunities, challenges and best practices of cross-platform HTML5 development. Hear directly from industry analysts, the W3C, Intel, and other experts. Go
Free Research and Reports
- Dell Software Foglight APM 5.9: Introducing Big Data Repository/Reporting Supporting Web Analytics and User-Centric APM
- How Foglight Makes User Experience Management A Reality: Three Case Studies
- Application Performance Monitoring (APM) in the Age of Hybrid Cloud: Ten Key Findings by EMA
- Controlling and Managing Superuser Access
- 10 Steps to Cleaning up Active Directory
- Keynote Interview: CIO Randy Mott On GM's Unprecedented IT Transformation: Lessons Learned - InformationWeek Conference
- The Digital Disruptors - InformationWeek Conference
- Keynote Speaker: Michelle McKenna-Doyle, CIO, NFL - InformationWeek Conference
- Crash Course in Open Source Cloud Computing - Interop Las Vegas
- No CIO Ever Got Promoted For… - Interop Las Vegas
Dark Reading Digital Magazine
Quick Wins For Strengthening SMB Security
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
SQL injection vulnerability in ImageCMS before 4.2 allows remote authenticated administrators to execute arbitrary SQL commands via the q parameter to admin/admin_search/. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands.
Cross-site scripting (XSS) vulnerability in open-flash-chart.swf in Open Flash Chart (aka Open-Flash Chart), as used in the Pretty Link Lite plugin before 1.6.3 for WordPress, JNews (com_jnews) component 8.0.1 for Joomla!, and CiviCRM 3.1.0 through 4.2.9 and 4.3.0 through 4.3.3, allows remote attackers to inject arbitrary web script or HTML via the get-data parameter.
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud Server before 5.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) new_name parameter to apps/bookmarks/ajax/renameTag.php or (2) multiple unspecified parameters to unknown files in apps/contacts/ajax/.
SQL injection vulnerability in addressbookprovider.php in ownCloud Server before 5.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, related to the contacts application.
SQL injection vulnerability in lib/db.php in ownCloud Server 5.0.x before 5.0.6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.