Security Threats Multimedia
-
Video: IT Priorities 2023 APAC
Sponsored by: TechTarget ComputerWeekly.comOver half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
-
IT Priorities 2018 - What's happening in security?
Sponsored by: TechTarget ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
-
Prevention Is Your First Line of Defense from Ransomware. But What If Prevention Fails? (VIDEO)
Sponsored by: StorageCraft Technology CorporationPrevention is Your First Line of Defense From Ransomware. But What if Prevention Fails?
-
SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
Sponsored by: IderaDBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
-
Security Operations Center (SOC) Essentials for the SME
Sponsored by: AT&T CybersecurityWatch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
Webcast: Symantec Internet Security Threat Report 2014
Sponsored by: Symantec CorporationDownload and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
-
How to Limit the Risk of Attack on your XP Assets
Sponsored by: AT&T CybersecurityThis webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Keep Endpoint Data Safe
Sponsored by: Code42This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
-
From SIEM to Security Analytics: The Path Forward
Sponsored by: EMC CorporationWatch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
-
Maximum-Strength Threat Detection for Mid-Size Enterprises
Sponsored by: EMC CorporationThis on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
-
Navigating Security in a Mobile World
Sponsored by: Cisco Systems, Inc.This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges
Sponsored by: LumensionIn this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.
-
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Sponsored by: LumensionThis informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
-
The Payment Island Deconstructed
Sponsored by: FireHost Inc.This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
-
Application Whitelisting Best Practices: Lessons from the Field
Sponsored by: LumensionThis in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
-
Hidden Lynx – Professional Hackers for Hire
Sponsored by: Symantec CorporationThis in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.