WEBCAST:
Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)
VIDEO:
This video explains the benefits of a new systems backup appliance that provides exceptional capabilities and performance to deal with increased storage demands.
sponsored by Ontrack® PowerControls by Kroll Ontrack
TRIAL SOFTWARE:
Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange Server and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.
WEBCAST:
Join Principal Analyst, Leslie Ament, in this on-demand webcast to gain a firsthand look at how to successfully manage social data. Uncover use cases of successful social intelligence and analytics, how to collaborate across multiple channels, and more.
WEBCAST:
This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
TRIAL SOFTWARE:
Many organizations are leveraging IBM’s DB2 for its cost and security benefits, as well as its ease of use. This resource introduces its new enhancements that further reduce storage costs and can lead to significant performance improvements. See firsthand what it can offer your organization by downloading this trial.
WEBCAST:
Check out this informative resource to learn what you should consider when choosing architecture for your big data project. Discover the seven top architectural qualities of big data production platforms, and one delivery platform that automates big data workflow for more efficient, effective processing.
PODCAST:
In this week's episode we discuss the about 7,000 leaked facebook documentes. It reveals how Facebook used and abused developers, cut off data to competitors, gave privileged access to its friends and used a "pivot to privacy" as camouflage. The team also talks about party manifestos in wake of the upcoming election.
VIRTUAL ENVIRONMENT:
The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.