Network Security Multimedia
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
About APCON – Intelligent Network Monitoring Solutions
Sponsored by: APCON, Inc.This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
Sponsored by: Cisco Systems, Inc.This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
-
Reducing Your Patch Cycle to Less Than 5 Days
Sponsored by: TenableThis informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
-
Reducing Security Complexity
Sponsored by: Optus BusinessIn this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
-
Detecting Security Breaches and APTs with Big Data Security Analytics
Sponsored by: LogRhythm, Inc.This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
-
Simplify Network Monitoring with Ixia Anue NTO
Sponsored by: IxiaAre you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
SIEM Demo: Get Complete Security Visibility in an Hour
Sponsored by: AT&T CybersecurityWatch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Healthcare Networking Classroom
Sponsored by: TechTarget Health ITBuilding wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
-
Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
Sponsored by: SpectorSoftSpector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
-
Data Centre to Cloud
Sponsored by: Juniper Networks, Inc.Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
-
Sophos EndUser Protection Overview
Sponsored by: SophosThis two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
HP Mobile Application Security
Sponsored by: Hewlett Packard EnterpriseWatch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
-
Cisco Prime Network Control System 1.1
Sponsored by: Cisco Systems, Inc.This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
-
Evolution to the Cloud
Sponsored by: CienaLearn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation.
-
GFI WebMonitor 2012
Sponsored by: GFI SoftwareHaving Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
-
Cisco CleanAir Technology
Sponsored by: Cisco Systems, Inc.Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
-
Cisco Connected World Technology Report
Sponsored by: Cisco Systems, Inc.Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
-
Mobile Application Security from HP - Build security into your mobile applications
Sponsored by: Hewlett-Packard EnterpriseWatch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.