Information Security Multimedia
-
KPN focuses on Information Security with HP
Sponsored by: Hewlett-Packard EnterpriseView this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
-
Economic & Productivity Impact of IT Security on Healthcare - Video
Sponsored by: ImprivataView this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
-
Podcast: The challenges of managing mobile devices across a corporate IT environment
Sponsored by: BlackBerryThis informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.
-
Webcast: The Newest Information Management Innovation from IBM
Sponsored by: IBMThis valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
-
Webcast: IBM Information Management in the New Era of Computing
Sponsored by: IBMDepending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
-
Modern Retention Enablement
Sponsored by: IBMThis quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.
-
IT Reputational Risk Study Overview
Sponsored by: IBMThis short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
-
Security University: Data Loss Prevention
Sponsored by: TechTarget SecurityThe difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
-
Bring Your Own Security to the Cloud
Sponsored by: CenterBeamWatch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Anatomy of a Database Attack
Sponsored by: ImpervaCorporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
-
LogRhythm 3-Minute Product Demo
Sponsored by: LogRhythm, Inc.This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
Sponsored by: LumensionThe "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
Sponsored by: Sun StorageTekLearn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
-
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Sponsored by: Juniper Networks, Inc.Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
-
2008 Verizon Business Data Breach Investigations Report
Sponsored by: Verizon BusinessCheck out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
Sponsored by: MicrosoftAttend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
What's New in Group Policy Administrator 5.0
Sponsored by: SUSEManaging Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
-
Service Management with AppManager
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
-
NetIQ Security Solutions for iSeries Trial
Sponsored by: SUSENetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
-
Directory and Resource Administrator 7.5 Trial
Sponsored by: SUSENetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
-
Ensuring VoIP Quality of Service
Sponsored by: SUSECompanies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.