Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST:
This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014
|
|
|
Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
|
|
|
Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST:
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014
|
|
|
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST:
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)
|
|
|
Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST:
In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014
|
|
|
Web Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST:
Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014
|
|
|
Keep Endpoint Data Safe
sponsored by Code42
WEBCAST:
This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014
|
|
|
EMC Video Surveillance Storage Solution
sponsored by EMC & Arrow
WEBCAST:
Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014
|
|
|
From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST:
Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012
|
|
|
Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST:
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012
|
|
|
Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT:
This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014
|
|
|
Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST:
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013
|
|
|
Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST:
View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013
|
|
|
KPN focuses on Information Security with HP
sponsored by Hewlett-Packard Enterprise
WEBCAST:
View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
Posted: 25 Nov 2013 | Premiered: Nov 25, 2013
|
|
|
HID Global's ActivID® Authentication: Online Banking
sponsored by HID Global
WEBCAST:
This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013
|
|
|
Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST:
View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013
|
|
|
How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST:
In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013
|
|
|
Enterprise Security Checklist
sponsored by Code42
WEBCAST:
This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)
|
|
|
Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST:
This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012
|
|
|
Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013
|
|
|
SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST:
Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013
|
|
|
Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST:
This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013
|
|
|
Expect More From Your SIEM
sponsored by AT&T Cybersecurity
WEBCAST:
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013
|
|
|
Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO:
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013
|
|