Vulnerability Assessments Multimedia
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
PCI DSS Simplified: What You Need to Know
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Expect More From Your SIEM
Sponsored by: AT&T CybersecurityUnlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
HP Mobile Application Security
Sponsored by: Hewlett Packard EnterpriseWatch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
-
Musings on the PSN Attack Vector
Sponsored by: Veracode, Inc.Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
-
Lumension Endpoint Management and Security Suite
Sponsored by: LumensionA new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
-
Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
Sponsored by: Wave Systems Corp.Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Smart Techniques for Application Security: Whitebox + Blackbox Security Testing
Sponsored by: IBMJoin us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
-
CORE IMPACT Pro V10
Sponsored by: Core Security TechnologiesPlease join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
What's New in Group Policy Administrator 5.0
Sponsored by: SUSEManaging Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
-
Service Management with AppManager
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
NetIQ Security Solutions for iSeries Trial
Sponsored by: SUSENetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
-
Directory and Resource Administrator 7.5 Trial
Sponsored by: SUSENetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
-
Ensuring VoIP Quality of Service
Sponsored by: SUSECompanies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
-
AppManager 6.0.2 Trial
Sponsored by: SUSEThe NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
-
Introducing AppManager 6.0
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.