Security Spending Multimedia
-
IT Priorities 2018 - What's happening in security?
Sponsored by: TechTarget ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
-
Cloud Security: Enterprise Point of View
Sponsored by: Dimension DataAccess this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Economic & Productivity Impact of IT Security on Healthcare - Video
Sponsored by: ImprivataView this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
-
2013 Cost of Cyber Crime – UK, France and Germany Findings
Sponsored by: Hewlett-Packard EnterpriseClick to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
-
How to take Advantage of Security Ops that go Beyond the OS
Sponsored by: Intel and McAfeeIn this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
-
Expect More From Your SIEM
Sponsored by: AT&T CybersecurityUnlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
-
CORE IMPACT Pro V10
Sponsored by: Core Security TechnologiesPlease join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
Sponsored by: LumensionThe "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
-
Lowering Risk by Applying Consistent Security Across All of Your Locations
Sponsored by: Juniper Networks, Inc.Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.