Security Policies Multimedia
-
Lowering Risk by Applying Consistent Security Across All of Your Locations
Sponsored by: Juniper Networks, Inc.Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
-
Automated Compliance: Making the Case and Reaping the Rewards
Sponsored by: Tripwire, Inc.Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
-
IBM Tivoli Security User Compliance Management Demo
Sponsored by: IBMThis demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
Cascading Risk
Sponsored by: Core Security TechnologiesThis webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.