Security Systems Multimedia
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Keep Endpoint Data Safe
Sponsored by: Code42This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
-
EMC Video Surveillance Storage Solution
Sponsored by: EMC & ArrowWatch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
-
From SIEM to Security Analytics: The Path Forward
Sponsored by: EMC CorporationWatch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
Navigating Security in a Mobile World
Sponsored by: Cisco Systems, Inc.This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
IBM Intelligent Investigation Manager
Sponsored by: IBMView this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
-
Rabobank International Enabling Customers to Bank Safe With HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
HID Global's ActivID® Authentication: Online Banking
Sponsored by: HID GlobalThis short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
-
Economic & Productivity Impact of IT Security on Healthcare - Video
Sponsored by: ImprivataView this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
-
How to take Advantage of Security Ops that go Beyond the OS
Sponsored by: Intel and McAfeeIn this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
-
Netwrix Auditor Enterprise Edition
Sponsored by: Netwrix CorporationWhen diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
-
Enterprise Security Checklist
Sponsored by: Code42This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
-
Detecting Security Breaches and APTs with Big Data Security Analytics
Sponsored by: LogRhythm, Inc.This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
-
Global Security University: IAM Integration Classroom
Sponsored by: IBMThis Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.