Security Multimedia
-
SIG - SASE in 15 minutes
Sponsored by: CiscoSecure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
-
Ransomware Threat Spotlight
Sponsored by: BarracudaAnother unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
-
Barracuda Lightboard: CloudGen Firewall
Sponsored by: BarracudaIn this short video, learn about Barracuda CloudGen Firewall, a family of physical, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure.
-
Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce
Sponsored by: BarracudaIn this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.
-
Securing Your Business During the COVID-19 Crisis
Sponsored by: BarracudaLike you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.
-
Scaling and Protecting Websites stretched by COVID-19
Sponsored by: BarracudaThe COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.
-
Protecting Business and Remote Workers from Covid-19 Email Threats
Sponsored by: BarracudaThe recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
-
Extending Secure Access to Remote Workers
Sponsored by: BarracudaThese are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.
-
CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel
Sponsored by: BarracudaTune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
-
Unlocking the Value of Data, Securely with AWS and Privitar
Sponsored by: Privitar, AWSThis webinar explains the importance of modern data security compared with the traditional data security system. Tune in to learn how you can elevate your security with the AWS Cloud.
-
Discover the Benefits of Database as a Service
Sponsored by: Oracle Corporation UK LtdWatch this video to learn about a Oracle's Exadata and SuperCluster Engineered Systems that deliver extreme database performance—while reducing costs and complexity.
-
Cloud Security: Enterprise Point of View
Sponsored by: Dimension DataAccess this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
-
Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
Sponsored by: LumensionMany companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
-
Java Insecurity: How to Deal with the Constant Vulnerabilities
Sponsored by: LumensionAccess this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
-
Overcoming the Challenges of Internal API Programs
Sponsored by: Intel® ServicesModernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
-
SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
Sponsored by: IderaDBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
-
Security Operations Center (SOC) Essentials for the SME
Sponsored by: AT&T CybersecurityWatch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
-
Enterprise Security and your Technology
Sponsored by: Hewlett Packard EnterpriseThis informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
-
Webinar: 20 Critical Controls for Cyber Defense
Sponsored by: ISACAJoin ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
-
Tips for Expediting Incident Response
Sponsored by: Threat Track SecurityThis informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
-
Symantec Endpoint Protection 12 Trialware
Sponsored by: Symantec CorporationAccess this trial software by Symantec and discover the benefits of effective endpoint security.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
How to Limit the Risk of Attack on your XP Assets
Sponsored by: AT&T CybersecurityThis webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
-
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Sponsored by: Trend MicroJoin a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.