Intrusion Detection Multimedia
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
Enhance Security with Intel® vPro™ Technology
Sponsored by: Intel CorporationSecurity and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
-
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Sponsored by: Juniper Networks, Inc.Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
-
Cisco ASA 5500 Series Adaptive Security Appliance
Sponsored by: Cisco Systems, Inc.In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.