SonicWALL Security Products | Partners | Contact Sales 1-800-509-1265
Search

 •   • 

Resources

Filter By:
Solution
Language
Category:

On-Demand Webinars

 of 102 more items  |  all items only  items + show summaries - hide summaries

  • view webinar
    Assurez-vous de la sécurité de votre entreprise pendant les fêtes.

    La saison des achats de fêtes de fin d'année a commencé avec pour conséquence un nombre record d’acheteurs en ligne, dont vos employés. Cette année, veillez à ce que votre réseau soit protégé et que vos employés soient autant productifs pendant les fêtes que toute l’année.

    29 Dec 2013 / ODW-186
  • view webinar
    Connected Security: Respond to 2014's Challenges

    We will look at major trends driving business decisions and then talk about how you can ensure that your IT security efforts can be a business enabler to support innovation and ultimately success in today’s demanding marketplace. Join us to learn how to: • Respond quickly to security threats and problems before they negatively impact the business. • Protect every part of the infrastructure – inside and outside the network – reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs. • Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time. • Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives

    5 Dec 2013 / ODW-188
  • view webinar
    The holiday online shopping season is here. Are you prepared?

    The holiday buying season is upon us, and that means record numbers of online shoppers, including your employees. This year, make sure your network is protected and your employees remain productive before Christmas and all through the New Year by joining our webinar, Protection and Productivity during the Holiday Season.

    28 Nov 2013 / ODW-185
  • view webinar
    Sorgen Sie dafür, dass Ihre Organisation in der Weihnachtszeit sicher bleibt.

    Der Startschuss für die Weihnachtsshopping-Saison ist gefallen. In dieser Zeit nutzen Millionen Menschen das Internet, um Geschenke online einzukaufen – auch während der Arbeitszeit. Nehmen Sie an unserem Webinar Schutz und Produktivität in der Weihnachtszeit teil. Wir sagen Ihnen, was Sie tun müssen, damit Ihr Netzwerk geschützt ist und Ihre Mitarbeiter produktiv bleiben – egal ob vor der Weihnachtszeit oder im neuen Jahr.

    27 Nov 2013 / ODW-187
  • view webinar
    Protection and Productivity During the Holiday Buying Season

    The holiday buying season featuring Cyber Monday is here again and that means online shopping. Lots of it. Find out how to keep your network secure from cyber-criminals and your employees focused by ensuring Internet bandwidth is reserved solely for critical business activity.

    12 Nov 2013 / ODW-184
  • view webinar
    Der mobile Wahnsinn – Strategien, um mobile Sicherheitsbedrohungen in den Griff

    Immer mehr Mitarbeiter wünschen sich einen schnellen und einfachen mobilen Zugriff auf geschäftskritische Unternehmensanwendungen. In diesem Webinar beschäftigen wir uns mit mobilen Sicherheitsbedrohungen und stellen Strategien vor, mit denen Sie mobiles Arbeiten ermöglichen und gleichzeitig das Risiko für Ihre IT-Infrastruktur senken können.

    31 Oct 2013 / ODW-179
  • view webinar
    Dans la folie de la mobilité : stratégies pour limiter les menaces mobiles

    La demande d’un accès simple aux applications indispensables via nos mobiles ne cesse de croître. Durant cette session, nous évoquerons les menaces que cela représente pour la sécurité de l’entreprise ainsi que les stratégies permettant d’offrir la mobilité nécessaire aux employés, tout en minimisant les risques pour l’infrastructure informatique des organisations.

    30 Oct 2013 / ODW-180
  • view webinar
    Mobile Madness - Strategies to mitigate Mobile Security Threats

    Demand for fast, easy mobile access to mission-critical business applications is on the rise. In this session we’ll outline the mobile security threats this presents and strategies to enable mobile workers while minimizing risk to IT infrastructure.

    29 Oct 2013 / ODW-181
  • view webinar
    What to look for in an IPS

    Cybercriminals often use advanced encoding methods, known as evasion techniques, to bypass the Intrusion Prevention Systems when gaining access to a network or other IT resource. Join Dell to learn about advanced evasion techniques and what to look for in a Next-Generation Firewall. Three things you will learn: -The danger of IPS evasion -Examples of different types of evasion -Dell SNWL NGFW 100% Anti-Evasion score from NSS Labs

    8 Oct 2013 / ODW-182
  • view webinar
    Mobile Madness - Strategies to mitigate Mobile Security Threats

    Demand for fast, easy mobile access to mission-critical business applications is on the rise. In this session we’ll outline the mobile security threats this presents and strategies to enable mobile workers while minimizing risk to IT infrastructure. Three Things you will learn: -Mobile trends: Secure mobile access to email and calendar is mainstream. What workloads are workers demanding access to now? -What security threats will this create for organizations? -What security strategies and technologies should be considered to enable mobile workers while protecting corporate infrastructure from threats?

    1 Oct 2013 / ODW-178
  • view webinar
    Pour une sécurité réseau en profondeur

    Les nouvelles cyber-attaques utilisent diverses techniques de plus en plus complexes pour contourner les dispositifs de détection et s’infiltrer en douce sur les réseaux des entreprises afin d’y dérober leur propriété intellectuelle. Rejoignez Florian Malecki de Dell SonicWALL pour tout savoir sur le fonctionnement de ces attaques modernes et évoluées et ce que vous pouvez faire pour tenir votre entreprise à l’abri.

    27 Sep 2013 / ODW-176
  • view webinar
    Warum effektiver Schutz so wichtig ist ?

    Moderne Angreifer gehen immer raffinierter vor, um unerkannt in Unternehmensnetzwerke einzudringen und geistiges Eigentum zu stehlen. Erfahren Sie von Sven Janssen, wie diese ausgefeilten Angriffe funktionieren und was Sie tun können, um Ihr Unternehmen zu schützen.

    26 Sep 2013 / ODW-177
  • view webinar
    The Need for Deeper Network Security

    Today’s cybercriminals employ complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property. Traditional firewalls that focus only on stateful packet inspection and access control rules are simply not effective in this advanced threat environment. Join Dell’s Florian Malecki, SonicWALL EMEA Product & Solution Marketing Manager, to learn how these sophisticated attacks work and how you can keep your network safe with Dell™ SonicWALL™ next-generation firewalls. Register for the webcast - in English - to learn how you can: • Protect against the latest threats as they emerge • Deliver advanced network security without compromising performance • Enforce acceptable use policies for social media and other web 2.0 apps • Ensure that high-priority business applications perform as they should • Identify departments and individuals who engage in risky or nonproductive behaviors • Reduce deployment and administrative costs

    25 Sep 2013 / ODW-175
  • view webinar
    The need for a deeper level of security without compromise

    Modern attacks employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property. Join Dell SonicWALL's Daniel Ayoub to learn how these advanced attacks work and what you can do to keep your organization safe.

    24 Sep 2013 / ODW-174
  • view webinar
    Dell SonicWALL Hosted Email Security – Easy to migrate to and quick to setup

    Dell® SonicWALL® Hosted Email Security offers superior cloud-based protection from spam, phishing attacks and malware to deliver best-in-class email security. Dell SonicWALL Hosted Email Security is easy to setup and administer with no on-premise installation required. Migration from services like Postini can be done in few simple steps. Get better security, ease of use and 24x7 phone support at an affordable price. Learn: 1. How to setup and provision a new instance Dell SonicWALL Hosted Email Security in less than 5 minutes 2. Migrate users and their settings from other solutions like Postini 3. Learn how to configure email spooling, LDAP integration, delegate control to users, allow/block list, Junk notification and many more features

    17 Sep 2013 / ODW-183
  • view webinar
    Keep the bad guys out and the good good guys good

    How can you best protect your business while still enabling end users to be productive? Join us for this webcast and see our approach, called Connected Security. Dell Software reduces risks from the inside-out and the outside-in, with a simple and unified approach. You need to protect your perimeter, but often, the highest profile breaches are perpetrated by insiders targeting the privileged accounts used only by trusted users. Today, you need security that spans both inside and outside of your network perimeter. No company is truly secure until they have addressed both. You’ll learn: -Why you need to protect your entire IT landscape -How effective security enables IT to take on BYOD, the cloud and more -Why the Dell approach is different

    7 Aug 2013 / ODW-172
  • view webinar
    Latest security threats research and analysis

    During this latest threat research update we will highlight the details on the current malware and vulnerabilities observed and analyzed by our team. In addition, we will share relevant threat telemetry data as observed across various geographic locations throughout the world. We will have time for Q&A so don't miss out.

    25 Jul 2013 / ODW-171
  • view webinar
    Shine the light on Shadow IT

    Driven by cloud computing and the consumerization of IT, IT departments are being forced to change how they operate. The explosion of consumer smartphones and tablets for business usage, known as BYOD (bring-your-own-device), is forcing IT organizations to deal with more tech-savvy business users, who are ushering in the era of Shadow IT. As IT departments are painfully aware of the growing practice of hardware devices and software applications that are used for business purposes but are not supported or controlled by the organization’s central IT department. Often IT lacks visibility into usage, which makes it difficult to exert control. Find out how to arm yourself against Shadow IT with Next-Generation Firewalls.

    11 Jul 2013 / ODW-170
  • view webinar
    Why protection and performance does matter for your network

    ZapFi offers an intelligent mobile marketing platform in combination with a high-performance, secure and free-to-consumer Wi-Fi solution. With the number of subscribers projected to spike to the millions, the company needed a highly scalable solution to provide comprehensive security without compromising performance. Find out why Gerry from ZapFi chose Dell SonicWALL over it's competitors.

    10 Jul 2013 / ODW-169
  • view webinar
    Why protection and performance does matter for your network

    ZapFi offers an intelligent mobile marketing platform in combination with a high-performance, secure and free-to-consumer Wi-Fi solution. With the number of subscribers projected to spike to the millions, the company needed a highly scalable solution to provide comprehensive security without compromising performance. Find out why Gerry from ZapFi chose Dell SonicWALL over it's competitors.

    27 Jun 2013 / ODW-167
  • view webinar
    Quantifying the Impact of Network Based Attacks

    This video and corresponding white paper offer a short guide to assessing the value of next-generation firewalls.

    17 May 2013 / ODW-166
  • view webinar
    End Point to Perimeter: Network protection that’s inside out and outside in

    Join us as top security experts look at some of the latest security challenges and provide strategies for defense, including how to quickly implement a robust solution that provides the protection you need without impacting your network performance or reducing employee productivity. You will learn how to better protect your networks from the inside as well as the outside, with solutions that reduce work for IT and security teams. You will learn about: •The malware menace – latest stats and facts •Third party industry firewall comparison results: which firewall is best for you? •Best and easiest practices for securing end points •How a customer implemented a solution—step-by-step •And much more…

    16 May 2013 / ODW-163
  • view webinar
    Keep the bad guys out and the good guys good

    How can you best protect your business while still enabling end users to be productive? Join us for this webcast and see our approach, called Connected Security. Dell Software reduces risks from the inside-out and the outside-in, with a simple and unified approach. You need to protect your perimeter, but often, the highest profile breaches are perpetrated by insiders targeting the privileged accounts used only by trusted users. Today, you need security that spans both inside and outside of your network perimeter. No company is truly secure until they have addressed both. You’ll learn: -Why you need to protect your entire IT landscape -How effective security enables IT to take on BYOD, the cloud and more -Why the Dell approach is different

    9 May 2013 / ODW-165
  • view webinar
    New Set of Network Security Challenges

    With two issues becoming increasingly crucial, IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall—smartphones, tablets, home PCs and laptops. On the other hand, risk man- agement dictates corporate data must remain protected. The overarching challenge: balance productivity and security.

    19 Apr 2013 / ODW-164
  • view webinar
    Latest threat research and how it affects your business

    On a daily basis your network is being attacked. Some you may be aware of others are hidden with in applications. Join Dell SonicWALL Director of Threat Research team to learn the following: - Analysis of each threat - Behavior and propagation techniques - Past and recent telemetry information associated with each threat We will have time for Q&A so don't miss out.

    9 Apr 2013 / ODW-162
  • view webinar
    Best practices: Email security cloud and virtual migration checklist

    When migrating to a cloud based solution, it is important to identify the migration steps. Being informed and prepared is the best solution. Join Dell SonicWALL as we review a best practices checklist for planning and executing an email security migration that minimizes the risk of business disruption. With our unique ability to deliver powerful, real-time email threat protection through a variety of deployment platforms ,Dell SonicWALL has an email security to meet the needs of your organization

    19 Mar 2013 / ODW-161
  • view webinar
    Overview of an ever-evolving threat landscape

    Every day, new cyber threats and attack techniques emerge to hammer on your network. The Georgia Tech Research Institute reports that it analyzes 100,000 pieces of new malware daily. With the growth of Advanced Persistent Threats (APTs) and hacktivist groups, staying on top of the threat landscape is more challenging than ever. You’ll learn: •The fastest growing security attack vectors and data breach sources •How to respond to emerging security threat trends •Why threat intelligence is important to IT security in an evolving threat landscape

    7 Mar 2013 / ODW-160
  • view webinar
    How to prioritize, secure and simplify your BYOD strategy

    While organizations are rapidly embracing Bring Your Own Device (BYOD), many IT executives still find it a complex proposition and are unsure of how to proceed. In reality, the actual BYOD solution may be a simple reapplication of existing technologies or relatively small adjustment but for others, it may require an extensive overhaul. You'll also hear how Boston Pizza Company implemented their BYOD solution.

    12 Feb 2013 / ODW-159
  • view webinar
    Top trends driving IT Security for 2013

    Information networks are staged for tectonic changes in 2013. Users and endpoint devices are proliferating across a range of platforms and OSs. Network resources are being virtualized. And the threats to systems and data are becoming more sophisticated and pervasive. Find out what all this means for IT security technologies and techniques and what you can do to stay ahead of the game.

    22 Jan 2013 / ODW-158
  • view webinar
    Under the hood: Malware research and protection

    As malware variants evolve and employ more sophisticated, evasive tactics, traditional security measures are no longer effective. With input from millions of shared touch points, the Dell™ Global Response Intelligent Defense (GRID) Network™ helps to identify new and emerging threats before they reach your organization. You’ll learn: •The steps required for continuous threat protection •Why it’s important to collaborate with security organizations and vendors •How threat data is cross-pollinated between Dell solutions

    17 Jan 2013 / ODW-157
  • view webinar
    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests

    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Alles, was Sie über unabhängige Tests wissen sollten: Viele Anbieter behaupten, dass ihre NGFW die beste Sicherheit und Performance bietet – aber stimmt das auch? Wir finden, eine solche Aussage sollte man auch objektiv belegen können. In unserem Webcast erfahren Sie, welche Bedeutung unabhängige Tests haben und warum Zertifizierungen wichtig sind, um die richtigen NGFW-Lösungen für Sie und Ihr Unternehmen zu finden.

    18 Dec 2012 / ODW-156
  • view webinar
    Product Demo: Road Test Our New Interactive Security Portal and Experience

    The new Dell Security Portal can help your help your organization stay protected in an era of increasing and advanced IT threats with insightful world-class security expertise. · LiveDemo showcases solutions in real-time to help in product selection and troubleshooting · Learn about solutions that now support iOS- and Android-based devices · Gain hands-on access to the entire Dell SonicWALL solution portfolio

    14 Dec 2012 / ODW-155
  • view webinar
    How to choose the right NGFW for your organization: Independent Third Party Test

    Vendors claim their NGFW have the best performance and protection, but how do you really know? Claiming to be the best and actually being the best are two different realities. Join Dell SonicWALL as we discuss the importance of Independent Third Party Testing and find out why testing and certifications are key to finding the right NGFW solutions for you and your organization.

    11 Dec 2012 / ODW-150
  • view webinar
    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Unabhängige Tests

    So wählen Sie die richtige NGFW für Ihr Unternehmen aus: Alles, was Sie über unabhängige Tests wissen sollten: Viele Anbieter behaupten, dass ihre NGFW die beste Sicherheit und Performance bietet – aber stimmt das auch? Wir finden, eine solche Aussage sollte man auch objektiv belegen können. In unserem Webcast erfahren Sie, welche Bedeutung unabhängige Tests haben und warum Zertifizierungen wichtig sind, um die richtigen NGFW-Lösungen für Sie und Ihr Unternehmen zu finden.

    11 Dec 2012 / ODW-152
  • view webinar
    Comment choisir le pare-feu nouvelle génération adapté à votre entreprise: tests

    Comment choisir le pare-feu nouvelle génération adapté à votre entreprise : tout ce qu’il vous faut savoir sur les tests de tiers indépendants Certains fournisseurs affirment que leurs pare-feu nouvelle génération offrent les meilleures performances et la meilleure protection. Mais comment en être sûr ? Il ne suffit pas de dire qu’on est le meilleur pour l’être vraiment. Ce webcast de Dell SonicWALL se penche sur l’importance des tests de tiers indépendants et vous explique pourquoi les tests et les certifications jouent un rôle essentiel dans la recherche du bon pare-feu nouvelle génération.

    11 Dec 2012 / ODW-153
  • view webinar
    How to choose the right NGFW for your organization: Independent Third Party Test

    Vendors claim their NGFW have the best performance and protection, but how do you really know? Claiming to be the best and actually being the best are two different realities. Join Dell SonicWALL as we discuss the importance of Independent Third Party Testing and find out why testing and certifications are key to finding the right NGFW solutions for you and your organization.

    10 Dec 2012 / ODW-154
  • view webinar
    How to Enable Secure Access for BYOD at Work

    Mobile devices have propagated into every facet of our lives from the personal to the business. BYOD has brought with it significant opportunities and serious risks for organizations. Join Matt Dieckman, Product Line Manager - Secure Remote Access Solutions at Dell® SonicWALL® to learn how SSL VPN solutions can help you provide secure access to corporate, academic and government resources from a wide variety of devices, including Apple and Android smartphones and tablets. This session will also dive into the BYOD policies you'll need to implement to securely allow access to data from non IT managed devices.

    5 Dec 2012 / ODW-149
  • view webinar
    Combating Cyber Threats: An Insider’s Look at Modern Network Security

    Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter while maintaining a balanced budget. Confronted with multifaceted goals, what does it entail to ensure your organization is up to date with next-generation threat protection? Join the discussion with Jerry Horton from Mississippi Department of Corrections as he gives you an insider’s view at his strategy and how he used next-generation firewalls to increase his network security within budget and still enable secure remote access to hismobile workforce. Register for the BrightTALK Hacker Summit<http://www.brighttalk.com/webcast/1745/49441> webinar, hear how Dell SonicWALL supports organizations like yours for successful network security strategy

    5 Dec 2012 / ODW-151
  • view webinar
    How to Enable Secure Access for BYOD at Work

    Mobile devices have propagated into every facet of our lives from the personal to the business. BYOD has brought with it significant opportunities and serious risks for organizations. Join Matt Dieckman, Product Line Manager - Secure Remote Access Solutions at Dell® SonicWALL® to learn how SSL VPN solutions can help you provide secure access to corporate, academic and government resources from a wide variety of devices, including Apple and Android smartphones and tablets. This session will also dive into the BYOD policies you'll need to implement to securely allow access to data from non IT managed devices.

    31 Oct 2012 / ODW-148
  • view webinar
    CSI Network: Crimes of Bandwidth - Discovering the Culprit Using Network Forens

    In the world of digital networks, security breaches and anomalous traffic plague IT departments worldwide. How do you pro-actively analyze networks where information is transmitted and lost in nanoseconds? Network forensics monitors and analyzes network traffic to detect intrusions, attacks, and abuses while the crime is occurring -- before your network is victimized. If your network has been breached or degraded by intruders or users, then join Dell SonicWALL for this hour of CSI Network.

    17 Oct 2012 / ODW-147
  • view webinar
    Securing information in higher education organizations

    Information technology in higher education environments is constantly evolving and consequently, continually presenting challenges to the overall security of the environment and the information contained therein. This webinar will explore these challenges and demonstrate how Dell can help provide solutions to these challenges while continuing to utilize the power and ubiquity of today's complex information networks.

    9 Oct 2012 / ODW-145
  • view webinar
    Postini shutdown raises the question again - Cloud or on-premise email security?

    The recent decision by Google to shutdown Postini has left many wondering if hosted services is the right direction for your organization. The closure of Postini email security is forcing customers to migrate to Google Apps. However, migration to Google Apps won’t be easy and doesn't offer the support or functionality you need. Join us and learn about different deployment platforms to meet your organization’s email security needs. Understand the pros and cons of on-premise vs. cloud based deployments. Attend the webinar to learn and understand how to make an informed decision to protect your email infrastructure.

    2 Oct 2012 / ODW-146
  • view webinar
    HIPAA for the Small Healthcare Provider: Security and Compliance Part Two

    Just because you are a smaller healthcare provider doesn’t mean you cannot have the same technology as the big guys. At Dell SonicWALL we believe we can deliver the same security solutions without breaking the bank.

    18 Sep 2012 / ODW-142
  • view webinar
    How to choose the right NGFW for your organization: Independent Third Party Test

    Vendors claim their NGFW have the best performance and protection, but how do you really know? Claiming to be the best and actually being the best are two different realities. Join Dell SonicWALL as we discuss the importance of Independent Third Party Testing and find out why testing and certifications are key to finding the right NGFW solutions for you and your organization.

    18 Sep 2012 / ODW-143
  • view webinar
    HIPAA for the Small Healthcare Provider: Security and Compliance

    Are you a small healthcare provider, just a few doctors, dentists, chiropractors or other providers? Don’t have the budget for a full time Security and Compliance staff so you require your office manager to do the best they can? You know you need to be concerned about HIPAA, beyond just the form your patients fill out, but are not sure where to start? Just because you are a small healthcare provider, does that mean you can’t have the same security technology that the big guys have without breaking the bank? At Dell SonicWALL we know you can.

    11 Sep 2012 / ODW-144
  • view webinar
    Preparing for Future Threats: Why Legacy Firewalls Just Don’t Cut It

    The sophistication and methods used by cyber criminals is more advanced than ever before. Security technology is constantly evolving to keep pace with this ever-continuing game of cat and mouse. Yet many organizations continue to rely on antiquated security products to protect themselves. True security requires diligence, education and multiple layers of protection. In this session we will examine some of the shortcomings of legacy firewall security products and what next generation protection is all about.

    5 Sep 2012 / ODW-137
  • view webinar
    Dell SonicWALL: PCI - Concerns and Solutions

    Dell SonicWALL will be discussing challenges and solutions in the retail and hospitality environments when tackling PCI Compliance. Join us as we discuss various requirements set forth by the payment brands, the concepts behind the standards, technologies in payments, and how Dell SonicWALL can help address the security requirements found in PCI environments. Various areas of security, productivity, connectivity, remote access, and global management will be explored surrounding the needs of today's point of sale networks.

    4 Sep 2012 / ODW-141
  • view webinar
    Why It's Time to Upgrade to a Next-Generation Firewall

    Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:

    14 Aug 2012 / ODW-138
  • view webinar
    Is Your Firewall ICSA Labs Certified and Evaluated?

    Firewall vendors often make claims about their Next-Generation Firewall’s capabilities. To judge the true potential of a Next-Gen Firewall, however, you need independent testing. Join Brian Monkman of ICSA Labs and Daniel Ayoub of Dell SonicWALL for this interactive web seminar, and learn why third-party validation—such as the rigorous testing methodology deployed by ICSA Labs—is crucial when evaluating a Next-Generation Firewalls.

    7 Aug 2012 / ODW-139
  • view webinar
    How to Enable Secure Access for BYOD at Work

    Mobile devices have propagated into every facet of our lives from the personal to the business. BYOD has brought with it significant opportunities and serious risks for organizations. Join Matt Dieckman, Product Line Manager - Secure Remote Access Solutions at Dell® SonicWALL® to learn how SSL VPN solutions can help you provide secure access to corporate, academic and government resources from a wide variety of devices, including Apple and Android smartphones and tablets. This session will also dive into the BYOD policies you'll need to implement to securely allow access to data from non IT managed devices.

    11 Jul 2012 / ODW-127
  • view webinar
    Why It's Time to Upgrade to a Next-Generation Firewall

    Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar:

    26 Jun 2012 / ODW-128
  • view webinar
    The Threat of Social Media

    Social networks from Facebook to LinkedIn are posing serious security threats to organizations. Malicious links and compromised social media APIs are a few of the risks emerging from both user behavior and flaws in application software. Creating a holistic Web 2.0 strategy that incorporates acceptable use policies, user education, and Next Generation Firewalls is vital to protecting your organization from what is becoming a major threat vector. Join Daniel Ayoub of SonicWALL as he explores optimal practices for securing your business from social network threats.

    21 Jun 2012 / ODW-129
  • view webinar
    Best Practices: Take the Guesswork out of Backup and Recovery

    Are you backing up your SMB data? Are you confident that in the event of a loss, you would be able to successfully restore your systems? Join us to hear about the best practices your backup strategy should implement to ensure you can quickly, reliably restore files, applications and systems.

    5 Apr 2012 / ODW-130
  • view webinar
    Using a Solid Risk Management Strategy to Boost Your Disaster Recovery Plans

    In this session we will cover the 5 essential steps for effective risk management. We’ll take a look at how each of them are critical to protect your business – especially in the event of a major business disruption.

    22 Mar 2012 / ODW-131
  • view webinar
    Social Engineering: The Art of Manipulation

    Social engineering is the ultimate art of manipulating people. Millions of dollars are lost from businesses every year due to employees in avertedly divulging confidential Information. In the session we will examine how social engineering is used, who is using it and best practices for preventing it.

    15 Mar 2012 / ODW-132
  • view webinar
    Lighting up your entire network: Performance and Productivity

    Join us for an introduction to the leading edge in flow-based network and application traffic analytics technology. Jan Sijp of SonicWALL will be joined by Mike Patterson, who is the CEO of Plixer, industry guru, and flow analytics expert. When your network is slow it may not always be evident where the bottleneck is. A server may be misconfigured or infected with a virus but you have no easy way of identifying the problem. Employees may be over-utilizing your network by using non-work related applications. And when you’ve legitimately reached the maximum capacity of your Internet connection, your finance department may be asking for a justification for your request for a higher bandwidth connection. During the session, Jan and Mike will discuss in detail how flow analytics tools can help you light up your entire network and address all the above issues. In particular, they will discuss the SonicWALL Scrutinizer product, a multi-vendor, application traffic analytics visualization and reporting tool to measure and troubleshoot network performance and utilization. They will also highlight the unique ability of Scrutinizer to identify all user activity (applications, web usage, etcetera) on a SonicWALL firewall.

    8 Mar 2012 / ODW-133
  • view webinar
    Hall County Schools Speaks on SonicWALL SuperMassive

    Hear Hall County Schools speak on their reasons for choosing SonicWALL SuperMassive. Based in Gainesville, GA, Hall County’s SonicWALL infrastructure protects 26,000 students and 5,000 staff members across 40 locations. The county replaced its Cisco and Websense solution with SonicWALL to achieve greater performance, scalability and central management.

    6 Mar 2012 / ODW-134
  • view webinar
    Today's threats are over achievers -Are you prepared to respond?

    Attacks targeting your network go deep and wide, reaching the nooks and crannies of your systems. Your perimeter defenses of old don't make the grade and are not going to protect you from today as targeted, persistent threats. Protecting all layers of the network and responding rapidly to an attack with decisive action, armed with complete and clear evidence, must be the focus of security teams today. Join Daniel Ayoub, Manager of Product Marketing at SonicWALL and Andrew Brandt, Director of Threat Research of Solera Networks to see how the SonicOS Network Security Platform, combined with comprehensive Network Security Analytics from Solera Networks, gives you the ultimate in protection, visibility and incident response capabilities.

    22 Feb 2012 / ODW-135
  • view webinar
    Next-Generation Firewall for Federal: Enabling Application Control

    Upwards of 50% of your network traffic is flowing on general Internet ports. In this webinar SonicWALL will discuss: -How do I identify the applications and users who are consuming my network bandwidth -How do I indentify the applications that are an attack vector for malware in my network -How can I manage/inspect SSL encrypted traffic, so that it does not become an attack vector.

    16 Feb 2012 / ODW-136
  • view webinar
    The Top Trends Driving IT Security in 2012

    Information networks are staged for tectonic changes in 2012. Users'™ endpoint devices are proliferating across a range of platforms and OSs. Network resources are being virtualized. And the threats to systems and data are becoming more sophisticated and pervasive. Find out what all this means for IT security technologies and techniques.

    1 Feb 2012 / ODW-126
  • view webinar
    Merry Phishmas 2011

    Join product line manager Swarup Selvaraman from SonicWALL as he reviews the most interesting phishing attacks from 2011. Learn how creative techniques are used to gain illicit access to your personal and confidential information and find out why the holiday season is a particularly busy time for attackers. Educate yourself on ways to protect your organization by attending this informational webinar.

    22 Dec 2011 / ODW-125
  • view webinar
    Reducing Application Latency and Over-Burdened WANs with WAN Acceleration

    The emergence of collaboration applications such as Microsoft SharePoint and Windows File Share present a challenging balancing act for enterprises today. These applications not only overburden available WAN bandwidth by transmitting an increasing number of files and data sets over WANs, but essentially increase WAN traffic. IT often responds by expending budget on more bandwidth or enhanced services. Join this webinar to learn from leading security experts how to use WAN Acceleration to prioritize and minimize application traffic between remote and branch offices, and in turn optimize your network performance.

    20 Dec 2011 / ODW-123
  • view webinar
    How to Enable BYOD (Bring Your Own Device) at Work

    Join SonicWALL's Patrick Sweeney, VP of Product Management, as he offers up practical advice on how to enable mobility in your workforce. People are increasingly demanding the ability to use their personal communications devices to access email and network resources when they are away from the office. Come learn how to embrace this trend to allow people to use iPhones, iPads, Android phones and more not only at home but also at work.

    9 Dec 2011 / ODW-124
  • view webinar
    Exploring the Digital Underworld: Botnets, Zero Day Threats and Phishing

    Organized crime has shifted to the digital underworld. As a result a host of new techniques have appeared that are designed to steal data, money and wreak havoc. Millions of businesses worldwide are currently exposed to these new and sophisticate threats. In this session we will take a look at some of the most dangerous Botnets, Zero Day Threats and Phishing. We look at the anatomy of these threats, give real-world examples of how they are being used and give you tips on how best to defend yourself.

    7 Dec 2011 / ODW-122
  • view webinar
    Next-Generation Firewall and Content Filtering for K-12: An Analysis of Vendors

    IT security professionals at K-12 schools face a growing list of educational and administrative demands on their network. Legacy firewall and web filtering products have failed to keep pace with requirements stemming from new learning initiatives as such as the 21st century classroom and anytime/anywhere learning. This webcast discusses how Next-Generation Firewalls (NGFWs) address the network security, bandwidth management, and content filtering challenges currently facing today's K-12 organizations. NGFWs deliver a comprehensive and highly granular solution for network security, bandwidth optimization, application visibility, and content control that reduces the cost and complexity of running educational networks. This webcast provides a hard-hitting competitive analysis of leading NGFWs and Content Filtering solutions from the following vendors: Cisco, Fortinet, Juniper, Lightspeed, SonicWALL and Websense.

    16 Nov 2011 / ODW-120
  • view webinar
    Next-Generation Firewall Deployments: Lessons from the Front Lines

    Many organizations are now migrating to Next-Generation Firewall (NGFW) solutions to improve security, consolidate functionality and ensure compliance. In this session we will examine the cyber security challenges faced by real world companies and how they used Next-Generation Firewall solutions to solve them. You will also hear live from The Spence Group Services, a distributed enterprise with 56 retail outlets - about how they used a Next-Generation Firewall solution to simplify and improve security while getting PCI Compliant.

    9 Nov 2011 / ODW-121
  • view webinar
    Are You in Control of Your Network? Ask Your Firewall...

    The world of network security threats has changed radically and chances are your firewall is not providing the security you need. This 40 minute webinar reveals what has changed and how you can easily make the switch to a Next-Generation firewall. Customers who have traded-up to SonicWALL will share their challenges and perspectives on making the switch from Cisco, Check Point and others.

    8 Nov 2011 / ODW-118
  • view webinar
    Why It's Time to Upgrade to a Next-Generation Firewall

    New technologies and advanced malware attacks have dramatically affected the distributed network and the security challenges surrounding it. First-generation firewalls are failing to stop the invasion of new and sophisticated threats. Costs are soaring as IT keeps layering on devices to address these challenges. Coupled with this the need for additional bandwidth is increasing – just to maintain the performance of mission critical applications. Is your firewall capable of handling the growing demands of your business while managing and securing the malware-ridden, application-centric network? Attend this presentation to learn how the Next-Generation Firewall series from SonicWALL enables organization to regain control of and secure their application-centric networks while at the same time, lowering associated costs.

    3 Nov 2011 / ODW-119
  • view webinar
    Next Generation Application Traffic Analytics

    Join us for an introduction to the leading edge in Application Traffic Analytics technology. SonicWALL Application Traffic Analytics solutions provide organizations with powerful insight into application traffic, bandwidth utilization and security threats while providing powerful troubleshooting and forensics capabilities. During the session we’ll cover various new SonicWALL Application Traffic Analytics Solutions including Scrutinizer, Analyzer, and version 7.0 of the Global Management System.

    14 Oct 2011 / ODW-39
  • view webinar
    Are You in Control of Your Network? Ask Your Firewall...

    The world of network security threats has changed radically and chances are your firewall isn’t providing the security you need. This 40-minute webinar reveals what has changed and how you can easily make the switch to a Next-Generation firewall. Customers who have traded-up to SonicWALL will share their challenges and perspectives on making the switch from Cisco, Check Point and others.

    12 Oct 2011 / ODW-41
  • view webinar
    Are You in Control of Your Network? Ask Your Firewall...

    The world of network security threats has changed radically and chances are your firewall isn't providing the security you need. This 40-minute webinar reveals what has changed and how you can easily make the switch to a Next-Generation firewall. Customers who have traded-up to SonicWALL will share their challenges and perspectives on making the switch from Cisco, Check Point and others.

    12 Oct 2011 / ODW-40
  • view webinar
    Introducing a More Sophisticated and Intelligent Data Protection Strategy

    Introducing the all new SonicWALL Continuous Data Protection (CDP) Version 6, completely re-architected from the ground up, delivers a sophisticated and systematic data protection solution with granular policy controls, complete manageability, and rich disaster recovery capabilities to do exactly that. CDP is designed to fit a wide range of deployment scenarios and will integrate seamlessly into your IT environment. Join product manager Ken Dang as he shares key product details and demonstrates new features and capabilities. SonicWALL's next-generation CDP platform sets a new standard in data backup and disaster recovery; don't miss this exciting and important session.

    29 Sep 2011 / ODW-43
  • view webinar
    Five Simple Steps to Take Total Control of Employees' Data

    Chances are very good that your employees use a mobile device such as a laptop to create and process data in their daily business activities. Add to that the fact that many business interactions are conducted in the field, outside the typical office environment. Your employees are meeting with clients and vendors, giving presentations and creating numerous business documents using their laptops. Content generated with these devices does not necessarily get copied or transferred to a server in the data center for regular backup. This continuing transition of when and where we work introduces new challenges in protecting data. For those entrusted with the difficult task of safeguarding company data, you may be wondering how you can possibly get your employees to become disciplined about backing up their data when the reality is no one even wants to have to think about backup. And they’re right, backups should just happen automatically – no matter where it resides. Here’s the solution: Do not expect your employees to remember to backup their data. Instead, take total control. Register now for this informative webinar to hear how in five simple steps, you can automate and streamline your backup workflow to accomplish that.

    27 Sep 2011 / ODW-44
  • view webinar
    Disaster Recovery Classroom Session: Part 3- Intelligent Data Protection

    Join this web seminar to understand how SonicWALL Continuous Data Protection (CDP) can play a critical role in restoring your data. CDP provides a more intelligent and systematic data protection strategy. It automatically preserves and protects business-relevant data assets against loss from file, device, and location-based disasters. With support for Windows®, Linux® and Mac operating systems through a single Web GUI, CDP provides granular, globally enforced policy controls over the entire backup operation. Join this event to learn more.

    22 Sep 2011 / ODW-45
  • view webinar
    Disaster Recovery Classroom Session: Part 2- Maintaining Workforce Continuity

    Are bad weather or natural disasters disrupting your business and preventing employees from doing their mission critical jobs? Organizations across the world continually experience business and workforce continuity challenges from many types of disruptions- including strikes, natural disasters, bad traffic and bad weather. Join this presentation to learn how to build a robust, flexible business and workforce continuity plan that delivers secure access to the network from any location using any device. Also learn how SonicWALL's Secure Remote Access (SRA) Solutions can dramatically increase your employees productivity, driving your revenue up while your competition struggles

    20 Sep 2011 / ODW-46
  • view webinar
    Disaster Recovery Classroom Session: Part 1- Surviving the Storm

    Join this Classroom Session to learn the importance of putting together a solid disaster recovery plan for your critical IT infrastructure. Learn practical tips on how you can incorporate teleworking, secure remote access, ISP redundancy, continuous data protection and off-site backup to allow your business to continue to prosper in the wake of the next Hurricane Irene.

    16 Sep 2011 / ODW-47
  • view webinar
    Roundtable: Enabling Security and Bandwidth Optimization on Education Networks

    The emergence of IT trends such as Web 2.0 and mobility present a challenging balancing act for K-12 school districts across the nation. While social media and “Anytime, Anywhere Learning” clearly enrich the learning experience, these developments present IT administrators with an ever-growing list of educational and administrative demands on their network. New bandwidth–hungry Web 2.0 applications and social media sites are overwhelming networks and first-generation firewalls are failing to stop the invasion of application-based threats. Clearly, K-12 IT administrators need to find a better way to manage bandwidth and security on the new application-centric network. Join this webinar to learn from leading security experts on how to use next-generation firewalls to provide robust bandwidth management and prioritization of application traffic for VoIP, video conferencing and social media resources.

    14 Sep 2011 / ODW-48
  • view webinar
    Why it's time for Secure Network Optimization

    SonicWALL's Secure Network Optimization for the enterprise enables IT to more easily and efficiently get back-in-control. This advanced security platform consolidates: * Next-Generation Firewall *Application Intelligence, control and visualization *Gateway Protection *Inspection for SSL encrypted session *WAN acceleration for distributed offices This web seminar will view the benefits of these powerful solutions and the benefits of bringing them together in a network.

    13 Sep 2011 / ODW-49
  • view webinar
    A New Era of Threat Mgmt: App. Intelligence & Control with Next-Gen Firewalls

    New technologies such as Web 2.0, social networking, cloud computing and mobility have dramatically affected the corporate network and the security challenges surrounding it. Bandwidth–hungry Web 2.0 applications and social media sites are overwhelming networks and first-generation firewalls are failing to stop the invasion of new and sophisticated threats. Costs are soaring as the need for bandwidth increases – just to maintain the performance of mission critical applications. Is your firewall capable of handling the growing demands of your business while managing and securing the application-centric network? Attend this presentation to learn how the Next-Generation Firewall series from SonicWALL enables organization to regain control of and secure their application-centric networks while at the same time, lowering associated costs.

    10 Aug 2011 / ODW-50
  • view webinar
    Is Your BackUp System Ready To Scale With Your Data?

    "My backup environment is constantly faced with changes, new regulation, and stricter data & disaster recovery requirements. As more data is being created, duplicated, stored and retrieved to serve important business needs, I’m often distracted by uncertainty about whether my current recovery solution is as right as it was when initially deployed." If this sounds like you, don’t let this be a point of distress. Register now for this informative webinar to hear how backup automation with rule-based, enforced administrative policy control can efficiently streamline backup workflow and adapt to the changing dynamics of your backup environment. If you’re responsible for safeguarding company data and ensuring compliance, join us as we will share with you what the key qualities to look for in a modernized backup and disaster recovery system, and why.

    4 Aug 2011 / ODW-51
  • view webinar
    Making Wireless work for PCI and Corporate Compliance

    In this web seminar, we will discuss how wireless can be used securely to process credit cards as well as offer guest and employee access. Learn how you can deliver content-specific access for guests (CFS) and employees, ensuring corporate compliance and protecting yourself from complaints and potential legal action.

    20 Jul 2011 / ODW-52
  • view webinar
    Achieve Reg & Corporate Compliance: SonicWALL Email Security

    This webinar provides an overview of the most important laws affecting email security; a look at SonicWALL’s email security solutions; and effective email security strategies SonicWALL customers employ to both comply with current and impending legislation and minimize the impact on their bottom line.

    19 Jul 2011 / ODW-53
  • view webinar
    Improving Network Efficiencies with SonicWALL's WXA Solution

    Why pay more money to your ISP when increasing bandwidth isn't always the answer? Learn how SonicWALL's WAN Acceleration solution (along with Application Intelligence and Control) can help you identify and resolve inefficiencies in WAN Bandwidth usage, while dramatically improving response times for remote and branch office workers.

    14 Jul 2011 / ODW-54
  • view webinar
    Thriving in the Era of the Mobile Workforce

    With a growing range of devices and points of entry on the network, IT departments are facing a grave challenge of providing high levels of security to sensitive corporate data. Organizations must take a comprehensive security approach to ensure that all the devices, content and applications are secure and virus-free. In this webcast, you will hear from leading security experts about the advantages of adopting a comprehensive mobility solution, extending high-performance firewall protection to mobile, remote and wireless environments, for secured mobile and wireless device access.

    13 Jul 2011 / ODW-55
  • view webinar
    Western Dental Reduces Costs and Complexity With SonicWALL

    Find out how Western Dental uses SonicWALL GMS and Next-Generation Firewalls to help them eliminate a huge amount of complexity from their IT environments in all of its 160 remote dental offices and clinics, HQ and datacenter; and with a lot fewer IT staff. Listen to how they keep their business up & running despite frequent outages of DSL & T1 lines which would bring some businesses to a standstill; how they can easily failover between multiple ISPs for continued Internet access but without having to deal with 3G convergence. Learn what makes SonicWALL GMS phenomenal for simplified management of multiple sites and how Virtual Assist saves time and money by troubleshooting laptops out in the field from the IT office.

    1 Jul 2011 / ODW-56
  • view webinar
    Next-Gen Firewalls for Federal Agencies:Enabling App Intelligence

    Web-based applications and social media have become key contributors to the success of many Federal agencies – driving collaboration, improving productivity and reducing costs. However, along with the benefits come significant risks: drained bandwidth, sophisticated application-layer threats and wasted employee time. Should agencies attempt to utilize coarse control functionality currently at their disposal, blocking ports or entire protocols just to eliminate access to a handful of known bad applications? Or do they take a more permissive course, allowing access to every application the organization deems necessary or useful? With Next-Generation Firewalls featuring Application Intelligence, Control and Visualization agencies do not have to choose between these extreme approaches. Organizations can implement and enforce granular policies governing application access and bandwidth prioritization while helping prevent application-layer threats and unwanted exposure of sensitive data. Join this 30-minute Web seminar to learn how SonicWALL® Application Intelligence and Control provides unprecedented visibility into your network activity.

    29 Jun 2011 / ODW-57
  • view webinar
    PCI Compliance and Managing a Distributed Retail Network

    Join this web seminar to get an understanding of the compliance requirements of a distributed networks. In this presentation we will show how organizations are leveraging SonicWALL solutions to help easily and cost-effectively achieve PCI compliance.

    16 Jun 2011 / ODW-58
  • view webinar
    The Pitfalls of Email Communication on Your compliance Efforts

    This webinar provides an overview of the most important laws affecting email security; a look at SonicWALL’s email security solutions; and effective email security strategies SonicWALL customers employ to both comply with current and impending legislation and minimize the impact on their bottom line.

    14 Jun 2011 / ODW-59
  • view webinar
    Merial Delivers Vital Remote Connectivity with SonicWALL

    Merial, a leading pharmaceutical company with 5,600 employees was struggling with their current IPSec VPN solution. User frustration was becoming costly as their help desk came under pressure. Watch this video to learn how they turned to SonicWALL Aventail Secure Remote Access Solutions to deliver flexible, scalable and cost effective remote access for their users – providing them a lifeline for connecting to critical network resources.

    2 Jun 2011 / ODW-60
  • view webinar
    A Data Leakage Prevention Strategy for SMBs

    The Web has become a bi-directional channel for communication where participation and collaboration are highly encouraged. Enterprises now depend on Web 2.0 tools to help them become successful. The downside, however, is that it’s significantly easier to accidentally disclose important data – a situation that is exacerbated by the high degree of cross-over and line-blurring taking place between user’s personal and work lives. In addition, Web 2.0 technologies are also making it easier to intentionally leak out sensitive information. Join this session to learn more about the potential for data loss through Web 2.0 applications and how it can affect your SMB organization. Discover how Application Intelligence and Control , Web Application Firewalls and Email Security can help significantly mitigate the data leakage threats.

    31 May 2011 / ODW-61
  • view webinar
    Next-Gen Firewalls for Tribal Nations: Enabling App Intelligence

    Web-based applications and social media have become key contributors to the success of many small Federal agencies – driving collaboration, improving productivity and reducing costs. However, along with the benefits come significant risks: drained bandwidth, sophisticated application-layer threats and wasted employee time. Should agencies attempt to utilize coarse control functionality currently at their disposal, blocking ports or entire protocols just to eliminate access to a handful of known bad applications? Or do they take a more permissive course, allowing access to every application the organization deems necessary or useful? With Next-Generation Firewalls featuring Application Intelligence, Control and Visualization agencies do not have to choose between these extreme approaches. Organizations can implement and enforce granular policies governing application access and bandwidth prioritization while helping prevent application-layer threats and unwanted exposure of sensitive data. Join this 30-minute Web seminar to learn how SonicWALL® Application Intelligence and Control provides unprecedented visibility into your network activity.

    10 May 2011 / ODW-62
  • view webinar
    What K-12 IT Admins Need to Know About Next-Generation Security

    Web 2.0 offers new, innovative ways to collaborate between teachers, students, administrators and parents. Educators can leverage the power of Web 2.0 by instantly tapping lesson resources that used to take weeks to synthesize into a useful format. Peer collaboration is now effortless, whether an associate is across the hall, or across the continent. Students now enjoy similar versatility in finding resources for research, learning, and writing. But the emergence of Web 2.0 presents a challenging balancing act for many K-12 IT administrators. Is your current firewall capable of handling the growing list of educational and administrative demands on your network, yet at the same time enabling you to effectively manage bandwidth and security while meeting regulatory requirements? SonicWALL Application Intelligence, Control and Visualization makes the job easy, with granular control and real-time visualization of applications to guarantee bandwidth prioritization and ensure maximum network security.

    28 Apr 2011 / ODW-63
  • view webinar
    The Effect of “Going Social” on Compliance

    Companies worldwide are embracing Social Networking and Web 2.0 applications in order to empower their workforce. After all, these new ways of communication and collaboration dramatically improve productivity and customer service. However, with this benefit comes a significant risk. The more open the communication, the higher the chance of data leakage, inadvertent data loss and sophisticated threats targeting a company’s critical information. So how does this risk play in the world of compliance? Join this session to learn more.

    14 Apr 2011 / ODW-64
  • view webinar
    Ensuring Business Continuity in the Face of Disaster / Disruption

    Is weather disrupting your business and preventing employees from doing their mission critical job? Organizations across the world continually experience business and workforce continuity challenges from many types of disruptions- including strikes, bad traffic and bad weather. Join this presentation to learn how to build a robust, flexible business and workforce continuity plan that delivers secure access to the network from any location using any device. Also learn how SonicWALL's Secure Remote Access (SRA) Solutions can dramatically increase your employees productivity, driving your revenue while your competition perishes in the cold.

    29 Mar 2011 / ODW-65
  • view webinar
    SSL VPN: Technology of Choice for Today's Mobile Workforce

    Join us for a 45-minute webinar to learn more about how today's mobile workforce and roadwarriors can effectively use SonicWALL's SSL VPN to stay productive. SSL VPN has become the technology of choice for people who need to get their work done when they are physically outside of their office. Because of the ubiquity of SSL and the plethora of access choices that it offers, SSL has become the preferred choice over IPSEC for secure remote access from a variety of devices. Not only that , but it is also the foundation technology for add-on services like SonicWALL Virtual Assist. Come join us for this webinar and learn about all the different ways to remain productive while on the move, using SonicWALL's SSL VPN technology.

    17 Mar 2011 / ODW-66
  • view webinar
    Introducing SonicWALL Next-Gen Backup & Recovery CDP Version 6.0

    Join us for this 60-minute session, and discover how the new, sophisticated global policy-base control backup and recovery techniques introduced in SonicWALL next-generation Continuous Data Protection (CDP) Version 6.0 provide a more intelligent and systematic data protection strategy for small and mid-size organizations that are struggling with the reliability and uncertainty of their backup and recovery results. In this presentation, we will discuss many of the new key features in Version 6.0, and how it solves the increasing need to reduce costs associated with backup and recovery, while complying with even the most stringent data recovery objectives and disaster protection. Register now for this webcast to learn more.

    16 Mar 2011 / ODW-68
  • view webinar
    A New Era of Threat Management - A Report from the Trenches!

    Modern malware loves Web application software. While Windows was once upon the primary security concern, Web applications are increasingly becoming the most favored path of least resistance into the enterprise. As these attacks continue to become more pernicious, IT organizations are finding they desperately need more sophisticated approaches to thwarting these threats. Come learn which Web 2.0 attacks today are the most lethal and how the IT staff at BGMX Retail Solutions is relying on SonicWALL security technologies to proactively defend itself.

    16 Mar 2011 / ODW-69
  • view webinar
    Introducing GMS 6.0 SP2 and GMS Mobile

    Join us to learn about GMS 6.0 SP2, the latest Global Management System release, and GMS Mobile, an iPhone application for GMS.

    16 Mar 2011 / ODW-67
  • view webinar
    A Scalable & Fail-Safe Email Security Solution: SonicWALL ES 7.3

    Designing an Email Security Solution that is fail-safe and has the ability to scale needs preparation and product know-how. Join this event to learn how the new Email Security 7.3 helps you do it. Learn what's new in ES 7.3 including: 1. Re-branding to meet your corporate guideline 2. Off-Appliance Storage - Allows redundancy and scalability 3. Dual Control Centers - Allows redundancy and scalability 4. Enhanced LDAP support - Allows redundancy

    8 Mar 2011 / ODW-70
  • view webinar
    Next-Generation Firewalls for Federal: Enabling App Intelligence

    Web-based applications and social media have become key contributors to the success of many Federal agencies – driving collaboration, improving productivity and reducing costs. However, along with the benefits come significant risks: drained bandwidth, sophisticated application-layer threats and wasted employee time. Should agencies attempt to utilize coarse control functionality currently at their disposal, blocking ports or entire protocols just to eliminate access to a handful of known bad applications? Or do they take a more permissive course, allowing access to every application the organization deems necessary or useful? With Next-Generation Firewalls featuring Application Intelligence, Control and Visualization agencies do not have to choose between these extreme approaches. Organizations can implement and enforce granular policies governing application access and bandwidth prioritization while helping prevent application-layer threats and unwanted exposure of sensitive data. Join this 45-minute Web seminar to learn more about SonicWALL® Application Intelligence and Control and how SonicWALL has partnered with Plixer’s Scrutinizer to provide unprecedented visibility into your network activity.

    2 Mar 2011 / ODW-71
  • view webinar
    Effectively Block Spam Using A SonicWALL Firewall Appliance

    Get the best spam protection available with SonicWALL’s Comprehensive Anti-spam Service (CASS) 2.0 release. Join this 30-minute Web Seminar to get an in-depth view of the solution. The CASS 2.0 release provides a host of new functionality including multi-level allow/block list, LDAP integration, Junk Store improvements and advanced search capabilities. SonicWALL has flexible licensing model to provide customers with greater flexibility in how they procure and deploy CASS. Join this event to learn: • How to manage Allow/Block Lists • LDAP configuration options • A first-look at the new Junk Store • Advanced search functionality

    1 Mar 2011 / ODW-72
  • view webinar
    Reduce TCO by Harnessing Virtualization for Secure Remote Access

    Join us for a 30-minute webinar to learn more about the SSL-VPN SRA Virtual Appliances. This latest appliance release provides a new way to deploy SonicWALL's SMB Secure Remote Access (SRA) functionality. The virtual appliance will bring together the advantages of a hardened appliance and virtualization, thus significantly improving the efficiency and availability of resources and applications. Come join us for this webinar to learn more about how SonicWALL's SMB SSL VPN Virtual Appliances can reduce the complexity and lower the TCO for your organization.

    24 Feb 2011 / ODW-73

 of 102 more items  |  all items only  items + show summaries - hide summaries