Systems Level Software Multimedia

(View All Report Types)
Cisco Prime Network Control System 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
Posted: 02 Jul 2012 | Premiered: 22 Jun 2012

Cisco Systems, Inc.

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Ontrack® PowerControls™ 6.0: Managing Data in Server Environments
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
TRIAL SOFTWARE: Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange Server and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.
Posted: 26 Mar 2014 | Premiered: 15 Mar 2010

Ontrack® PowerControls™ by Kroll Ontrack

IBM InfoSphere Data Architect V7.6
sponsored by IBM
TRIAL SOFTWARE: IBM InfoSphere Data Architect is a collaborative data design solution to help you discover, model, relate, and standardize diverse and distributed data assets. It supports dimensional modeling. This page contains more information about the product and access to a 30-day trial.
Posted: 20 Dec 2011 | Premiered: 20 Dec 2011

IBM

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

PHD Virtual Backup for VMware 6.5.2
sponsored by PHD Virtual
TRIAL SOFTWARE: Download your 15-day automatic trial for PHD Virtual Backup for VMware 6.5.2 with a new, innovative backup archiving feature. Now, automate the ability to replicate backup copies to a different location.
Posted: 04 Feb 2014 | Premiered: 04 Feb 2014

PHD Virtual

Tips for Upgrading to Oracle E-Business Suite R12
sponsored by Noetix Corporation
WEBCAST: Watch this webcast to learn how your queries can significantly benefit from an E-Business Suite (EBS) upgrade, and find out how to successfully migrate your reporting solutions from EBS 11i to Release 12.
Posted: 29 Feb 2012 | Premiered: Feb 29, 2012

Noetix Corporation

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.