More news webcasts
Almost every organization will adopt BYOD in some form to accommodate today's knowledge workers — who insist on using their personal smartphones and tablets for work, too. The question facing IT is how to safeguard the security of BYOD-style access to corporate resources, while also meetings users’ expectations for instant-on access to the resources they need to do their jobs.
With the introduction of the Microsoft' Windows' Storage Server 2012 offering via the IBM' Reseller Option Kit (ROK) program, clients can now get customized unified storage solutions which precisely match their specific needs. Combined with the IBM System x' servers, powered by the latest Intel' Xeon' processors and pre-installed by an IBM Business Partner, Windows Storage Server delivers enterprise-class storage management technology in an affordable, all-in-one solution. It is a great choice for your business regardless of whether you are a first-time user of network-attached storage (NAS) or you are deploying advanced storage solutions.
Effective mobile security requires a layered approach that coordinates mobile device security, mobile app security and mobile access security. Implementing these three aspects of mobile security as separate "silos" can easily result in gaps that will leave your organization vulnerable to the growing range of mobility threats - especially as your mobility threat surface keeps expanding over time.
The technology in smartphones and tablets is easier to use and more compelling than ever, so it’s no surprise that end users want access to these same tools in the workplace. Ironically, BYOD often becomes a roadblock to productivity when a device crosses the enterprise threshold.
Finding a tool that can do both has been challenging in the past. WebSphere Application Server v8.5 and v8.5.5 (WAS) meets all of the above criteria, providing a compelling offering to developers (from disparate verticals and backgrounds) as well as operators and administrators. You can learn more about WebSphere Application Server v8.5 and v8.5.5 (WAS) and the impressive set of features and functions available, including what's new in the latest release by attending this webinar.
This webcast is the perfect opportunity for IT managers to better understand the requirements, use cases, risks and benefits of DaaS to help frame their own decision-making. From the operational to the technical, attendees will develop a clearer understanding how DaaS may make the most business sense for their individual use cases.
Register for this webinar to gain information about the steps you need to insure your desktop virtualization project meets ROI expectations and is successful.
Join IBM's Debbie Miller to hear about the IntelligentManagement features that extend the quality of service provided by your middleware environment and configurable operational policies to govern the performance and health of your applications.
In this webinar we will review the understanding of agile development applied to mobile app development, and how the right approach can deliver on a fundamental need of mobile, faster response time to user feedback. We will explore the need for continuous build, continuous install, and continuous test as critical aspects of applying agile processes to delivering mobile apps in time and with the quality and capabilities their users demand.
Join us for this 60-minute webinar to learn more about the rapidly-changing trends in customer needs and demands, and to learn how financial enterprises can meet these requirements while shifting their focus from simply managing channels to providing meaningful customer experiences and on developing relationships. In addition, during this webinar, you'll find out how financial services firms can re-engineer their communications delivery to drive customer engagement, lower operational costs and meet regulatory mandates.
Issues with messaging deliverability can be dramatically compounded when sending in large volumes. Learn how to overcome these obstacles as we chat with Jill Resnick, a Postmaster who previously worked at Macy's and American Cancer Society, and Mike Hillyer, Global Solutions Consultant from Message Systems. They'll share their best practices on reducing deliverability issues, traffic shaping and other tips!
Register for this webinar that discloses the optimal DCIM strategy that ensures you are tapping the full business value of your data center.
Is your company struggling to keep up with unprecedented data growth? If so, you’re not alone. With the amount of data managed by enterprise datacenters expected to explode by a factor of 50 over the coming decade, CIOs now rank data growth as their top concern, and making sense of all that data as their top priority according to the Gartner CIO Agenda 2012.
You and your team have successfully analyzed a new class of business problem using big data. As you present your findings, you are challenged on the validity of your analysis. What are you going to do?
Join Future Cities and noted IT expert Carrie Higbie to identifies the fundamental concerns of datacenter scalability while offering a range of approaches to consider in addressing datacenter growth.
In this webinar, corporate strategist Merchant will discuss what those myths are and how organizations can improve processes to bust out of them, resulting in increased employee satisfaction and a reduction in customer attrition. These processes can also lead to better strategies, results, and trust.
Join this webinar to learn how content analytics can help you discover and gather the critical data trapped in unstructed documents, email messages, media comments, social forums and more. Learn how effective content management can reduce complexity and risk while ensuring greater productivity, lower costs and better outcomes.
Join this webcast to hear Matt Sunley, IBM Integration Bus (formerly known as WebSphere Message Broker) Product Manager, IBM Hursley Lab, discuss how .Net applications, mobile devices, the cloud and social data can all be easily integrated into your own universal connectivity fabric.
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won’t want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud.
InfoSphere Information Server v9.1 includes new capabilities that organizations need to integrate the extreme volume, variety and velocity of big data - from new and emerging big data sources. Join us to learn more about how Information Server forms a key piece of the IBM Big Data Platform for next generation analytics.
Join this teleconference and learn how the combination of IBM information governance offerings and analytic solutions on the z Enterprise platform can help you to enhance information integrity, availability and quality.
It can be an IT manager's biggest headache ? managing the growing number of remote users that are on the go and exclusively work from their laptops over wireless networks. And when a system fails to restart, a site visit often times is the only option for recovery. Now, with the powerful combination of Intel's latest vPro technology and Dell KACE Appliances, IT managers can enjoy remote systems management and recovery that is both effective and economical.
Join us as IT consultant Mary Shacklett outlines options for tweaking various segments of the IT infrastructure to achieve better datacenter performance.
Most businesses today are drowning in data. As a result, the warehouse has become strained. If you find yourself using your data warehouse as a repository for all data or having to throw away data because you're simply unable to store or process it in the warehouse, you may need to consider using big data technologies to augment your data warehouse. This webinar is for you.
Free Research and Reports
- Big Data: Architecting Systems at Speed - E2 Conference Boston
- Secure your mobile applications in the new commerce era - Mobile Commerce World - Mobile Commerce World
- Learn how to move your broadband service to an All-IP network at TelcoVision (formerly TelcoTV) - TelcoVision
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- How to Choose a SaaS Vendor - E2 Conference Boston
Dark Reading Digital Magazine
In This Issue
- Endpoint Security: End user security requires layers of tools and training as employees use more devices and apps.
- Security Isn't A Piece Of Cake: It's time we rethink the conventional wisdom about security layering.
- BYOD Is Here To Stay: Trying to keep employees' devices off the network is futile.
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Unspecified vulnerability in the client library in Siemens COMOS 9.2 before 184.108.40.206.10 and 10.0 before 10.0.3.0.4 allows local users to obtain unintended write access to the database by leveraging read access.
The Cybozu Live application before 2.0.1 for Android allows remote attackers to execute arbitrary Java methods, and obtain sensitive information or execute arbitrary commands, via a crafted web site. NOTE: this vulnerability exists because of a CVE-2012-4008 regression.
Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JUST School through 2010 allows remote attackers to execute arbitrary code via a crafted document.
The WifiPasswordController generateDefaultPassword method in Preferences in Apple iOS 6 and earlier relies on the UITextChecker suggestWordInLanguage method for selection of Wi-Fi hotspot WPA2 PSK passphrases, which makes it easier for remote attackers to obtain access via a brute-force attack that leverages the insufficient number of possible passphrases.