Micro Focus is now part of OpenText. Learn more >

WEBINARS

Discover and register for the best 2021 tech conferences and webinars for app dev & testing, DevOps, enterprise IT and security.

 
20 results
20 results
File Dynamics and File Reporter Product Line Update
File Dynamics and File Reporter
 Access the Resource
Join this session and learn how to choose the right deduplication method for your requirements, and understand how data deduplication can help you.
Data Protector Tips and Tricks Deduplication Best Practices
 Access the Resource
Is Docker and container technology part of your future CORBA strategy? Is there a need to simplify software deployment across a hybrid IT landscape? Join us as CORBA experts examine the importance of containers for CORBA systems and how to modernize existing applications without added cost or risk.
CORBA and Containers
 Access the Resource
In this webinar, you will find out about the latest capabilities available in data protection and disaster recovery solutions that can make a difference in your environment!
What's New in Data Protector DP11.02 and DP4CW 5.1
 Access the Resource
With the constant threat of cyber-attacks caused by malware or ransomware, IT demand to prevent unauthorized access and data breach couldn’t be greater. But, securing existing applications from attackers isn’t easy and often requires specialty tools and subject matter expertise. For business systems written in CORBA, what are the best options?
CORBA, Security and SSL
 Access the Resource
SMAX best practice presentation and discussion: Change Management.
SMAX best practice presentation and discussion: Change Management
 Access the Resource
Files on the move need maximum protection from unscrupulous privileged users and advanced persistent threats. In addition to securing C2B and B2B transfers, you need a way to automate and control your massive file transfer operation. Micro Focus Reflection for Secure IT provides you with this capability and allows you to:• Transfer files safely, through encrypted SSH tunnels• Gain centralized visibility and web-based control of your entire file transfer operation• Automate the transfer of files, including pre- and post-transfer processing• Strengthen authentication by requiring Public Key Authentication (PKI) Certificates, rather than passwords, for accessing your SFTP server• Expose files for inspection allowing you to stop advanced persistent threats by exposing files for third-party inspectionLearn more about the Reflection for Secure IT products in the upcoming webinar.This webinar will give you valuable information, including the latest release and the roadmap for future releases.
Reflection for Secure IT Customer Briefing
 Access the Resource

Pages