nCircle

Displaying 1-36 of 36 results

  • White Papers // Aug 2009

    CSO's Guide to Security and Compliance

    Security and compliance are the leading concerns of CSOs today. These can be difficult areas to navigate due to the increase in number and complexity of regulations, the constant changing threat environment and the economic pressure to reduce costs. IT teams need solutions that make security and compliance easier, more...

    Provided By nCircle

  • White Papers // Jun 2009

    Top 10 Tangible Measures for Effective Security Risk Management

    Visibility and measurement are the very heart of security risk management. Without them it would be impossible to identify, assess and mitigate risks. They are also the key to effective process management. Identifying appropriate metrics ideally requires a consideration of the organization's business goals, strategies and compliance requirements, and the...

    Provided By nCircle

  • White Papers // Mar 2009

    Change Is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself About Changes to Your Network

    This whitepaper lists 10 ways that enterprise environments typically change and what one can do to identify, analyze and manage these changes and their associated risks on an ongoing basis. Any device attached to network without authorization is a rogue device. Since these devices fall outside official network inventories, legacy...

    Provided By nCircle

  • Webcasts // Jan 2009

    Network Topology Analysis: The Most Effective Way to Prioritize Security Initiatives

    The rate of discovery of new vulnerabilities continues to increase, and security and operations teams simply do not have the resources to keep up. The attendee will learn how nCircle's new Topology Risk Analyzer prioritizes risk remediation using vulnerability and network topology-line of sight-risk, enabling IT staff to focus on...

    Provided By nCircle

  • Webcasts // Jan 2009

    Analyzing Your Network Security Risk With nCircle's Suite360 Intelligence Hub

    The attendee of this webcast will discover how to take advantage of IP360's open architecture to integrate the network intelligence gathered by IP360 and the existing systems and leverage that intelligence to measure, manage, and reduce network risk. The attendee will learn how nCircle's Security Intelligence Hub goes beyond simply...

    Provided By nCircle

  • Webcasts // Jan 2009

    Internal Security Compliance and Best Practices

    The presenter of this webcast will show how to measure, manage and improve the internal security posture, as well as streamline the compliance processes. The presenter will outline the most effective compliance strategies like base-lining and trending using nCircle's IP360 Vulnerability Management System. The attendee will also learn best practices...

    Provided By nCircle

  • Webcasts // Jan 2009

    Security Best Practices and Sarbanes-Oxley Compliance

    The attendee of this webcast will learn how Centillium is using nCircle's Sarbanes-Oxley Compliance Solution to measure and manage ongoing compliance efforts. Public companies in the US are required to meet a standard of due care and prove their due diligence to auditors, and IP360 automates much of the repetitive,...

    Provided By nCircle

  • Webcasts // Jan 2009

    Beyond Post It Notes & Patches

    This webcast throws about the challenges of IT Security and a review the five requirements for success that can help to change the culture of IT for improved security and compliance.

    Provided By nCircle

  • Webcasts // Jan 2009

    Sarbanes-Oxley Compliance Leveraging Automated Control Objective Auditing

    The attendee of this webcast will gain the insights and guidance one need to measure compliance, reduce manual efforts, and streamline executive and auditor reporting.

    Provided By nCircle

  • Webcasts // Jan 2009

    Web Applications and Information Security Tools and Tactics

    The attendee will learn how operational assessment of web applications can be effectively combined with vulnerability management using nCircle's WebApp360.

    Provided By nCircle

  • Webcasts // Jan 2009

    Automating Security & FDCC Compliance Auditing

    This webcast will provide a comprehensive overview and demonstration of nCircle's Configuration Compliance Manager. The attendee will learn how nCircle with SCAP-validated solutions can help to comply with policy and leverage the same technology to improve overall network security.

    Provided By nCircle

  • Webcasts // Jan 2009

    Using nCircle PCI Solutions to Stay Compliant

    The attendee of this webcast will learn how to achieve and maintain PCI compliance using nCircle's Certified PCI Scan Service, nCircle Configuration Compliance Manager, nCircle File Integrity Monitoring and Suite360 Intelligence Hub.

    Provided By nCircle

  • Webcasts // Jan 2009

    Best Practices For Effective IT Governance, Security Risk and Compliance

    The presenter will examine key enablers in the emerging discipline of strategic IT operations risk management driven by the convergence of regulatory compliance and security requirements. He will demonstrate how change and configuration discipline supports effective IT governance.

    Provided By nCircle

  • Webcasts // Jan 2009

    Fearless e-Commerce: Implementing File Integrity Monitoring for Security and PCI Compliance

    The presenter of this webcast talks about ensuring the integrity of the payment network to increase customer confidence during online transactions with the business.

    Provided By nCircle

  • Webcasts // Jan 2009

    Standardizing Security Operations: Using NIST?s Security Content Automation Program (SCAP) to Increase Security and Network Performance and Lower Operating Costs

    The presenter of this webcast gives an overview and demonstration of how NIST's Security Content Automation Program (SCAP) can be beneficial in achieving compliance with the Federal Information Security Management Act (FISMA) and other compliance requirements and how adoption increases security, increases network performance, and lowers operating costs.

    Provided By nCircle

  • Webcasts // Jan 2009

    Saving Money, Reducing Risk: Continuous Configuration Auditing Using Industry Standards and Benchmarks

    The presenter gives best practices in establishing a security risk and configuration management program incorporating the security configuration benchmarks from CIS. This demonstrated, integrated approach to risk management will reduce manual efforts, save money and enable repeatable and consistent results.

    Provided By nCircle

  • Webcasts // Jan 2009

    PCI V1.1: How Not to Become a Headline

    The Payment Card Industry (PCI) continues to demand the highest levels of protection of cardholder data and security of payment systems, making comprehensive, continuous PCI compliance a daunting task. The presenter address topics like the best practices for PCI compliance, creating a comprehensive, sustainable PCI security risk management program, choosing...

    Provided By nCircle

  • Webcasts // Jan 2009

    Solving the Risk & Compliance Equation With Agentless Technology

    Security risk and compliance management poses unique challenges to large enterprises, and the solution lies in automated, agentless network discovery. The presenter will demonstrate of how nCircle's patented discovery technology, multi-level reporting, and focused analytics can improve security and operational effectiveness.

    Provided By nCircle

  • Webcasts // Jan 2009

    Hackers, Generals, and Wall Street: Applying Cross-Discipline Risk Management Strategies to Network Security

    Information security professionals regularly discuss the nature of risk in the IT environment; however, there is a great deal to learn about risk management from other disciplines. The presenter will examine risk management models from a military operations and financial services perspective and discuss the applicability of lessons learned over...

    Provided By nCircle

  • Webcasts // Jan 2009

    Standardizing Security: The Role of Current and Emerging Security Standards in Vulnerability and Risk Management

    Enterprises in every industry rely on rules for interoperability that are governed by agreed industry standards. As the vulnerability and risk management market matures, many standards are emerging to create common measurements of risk. The presenter will discuss current and developing standards and help identify which ones are important to...

    Provided By nCircle

  • Webcasts // Jan 2009

    Operationalizing Risk Management: A Metrics-Based Approach to Comprehensive Risk Management

    The next generation of security best practices relies on a metrics-driven, risk-focused approach. The presenter will share the approach successfully implemented around the world by the US Agency for International Development (USAID). This approach is now a best practice - as USAID is the only Federal agency to earn a...

    Provided By nCircle

  • Webcasts // Jan 2009

    Quantifying Network Risk: Using nCircle's Unique Approach to Solve the Network Security Challenge

    Understanding what devices and exposures exist on the network is a critical first step to vulnerability management. Effective risk management, however, also requires the ability to rank identified risks to prioritize remediation. This scoring enables organizations to measure remediation effectiveness and track changes in their risk posture over time. This...

    Provided By nCircle

  • Webcasts // Jan 2009

    Three Steps to PCI Compliance: Meeting the PCI Network Scanning Requirements

    Complying with the Payment Card Industry (PCI) Data Security Standard can be confusing, time-consuming and resource-intensive. With fines of up to $500,000 for non-compliance, the ability to rapidly demonstrate compliance is important. This webcast will help to navigate through the PCI Data Security Standard guidelines and show how nCircle solutions...

    Provided By nCircle

  • Webcasts // Jan 2009

    Doomsday Scenarios: Understanding the Variables Driving Doomsday Scenarios and Strategies to Protect Your Organization

    The presenter illuminates the latest challenges facing security professionals in the constantly evolving threat landscape. The presenter discusses issues on the security and threat horizon that enterprises need to prepare for today: What are the disruptions and attacks that threaten businesses and the economy? What are the variables driving them?...

    Provided By nCircle

  • Webcasts // Jan 2009

    Beyond Reporting: Instant, Actionable Security Data Analysis

    The presenter of this webcast throws light on the next major advancement in network security data analysis. The presenter will show five real-world scenarios that show how nCircle Focus can save the valuable time and have an immediate impact in the organization.

    Provided By nCircle

  • Webcasts // Jan 2009

    nCircle Security Risk Management Solution Overview

    Interested in measuring, managing, and reducing the network security risk? The presenter gives an overview of the Security Risk Management solutions that help lower the overall network security risk using fewer resources at the lowest possible cost.

    Provided By nCircle

  • Webcasts // Jan 2009

    Leveraging Vulnerability and Risk Management to Achieve Comprehensive, Sustainable Compliance

    While the topic of risk management is not new, what is new is the need to identify formalized solutions to measure, manage, and reduce risk. These same solutions can be used to audit and illustrate the success of an organization's efforts to achieve regulatory and policy compliance. The attendee of...

    Provided By nCircle

  • Webcasts // Jan 2009

    The Changing Threat Environment: Staying Ahead of the Curve

    The vulnerability management industry has evolved significantly from the early days of attack-driven tools to the enterprise-wide compliance and topological discovery that is currently the norm. The presenter will highlight the important trends in vulnerability management and discuss current and future approaches to security and risk management.

    Provided By nCircle

  • Webcasts // Jan 2009

    nCircle Focus: Improving Security Operations With Active Data Analysis

    Enterprise security teams are stretched to their limit every day and are forced to make difficult decisions about where to spend their time. What they need is comprehensive network and risk information at their fingertips that they can analyze and synthesize instantly as the threat environment changes. The attendee will...

    Provided By nCircle

  • Webcasts // Jan 2009

    USAID Case Study: A Risk Management Approach to Security Compliance

    The United States Agency for International Development (USAID) provides economic and humanitarian assistance in more than 100 countries. USAID is the only Federal agency to receive an A+ in their Federal Information Security Management Act (FISMA) scoring for two consecutive years. nCircle is the foundation technology used to deliver these...

    Provided By nCircle

  • Webcasts // Jan 2009

    Cultivating the Enterprise for Proactive Network Security

    Most individuals and ultimately organizations as a whole do not understand the value of information security until there is loss. Until one have a toothache, his/her brushing regimen might be less than perfect. Getting an organization to take a more active role in information security is an essential change for...

    Provided By nCircle

  • Webcasts // Jan 2009

    Security - The Business Challenge

    The presenter of this webcast will discuss how objective security metrics like advanced analytics and dashboard reporting can help enterprises tackle the challenges associated with safeguarding their networks and business critical assets and data.

    Provided By nCircle

  • Webcasts // Jan 2009

    Deperimiterization - Building a Multi-Level Security Strategy to Prevent Infiltration

    With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage...

    Provided By nCircle

  • White Papers // Dec 2008

    nCircle Solutions for NERC CIP Compliance

    The original guidelines addressing cyber security in the energy infrastructure are known as NERC 1200 UAS. This standard was passed in 2003, in response to the Homeland Security Act of 2002. It was designed to reduce the overall vulnerability of bulk electric systems to cyber threats. However, NERC 1200 was...

    Provided By nCircle

  • White Papers // Nov 2008

    Automating HIPAA Compliance With Security and Configuration Auditing

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was designed to ensure that people who changed jobs or residences did not lose their health insurance. As the legislation was drafted, a rule was added to protect the privacy of individuals' personal health information - the Privacy Rule -...

    Provided By nCircle

  • Related Offers // Feb 2004

    Proactive Network Security Seminar 2004

    Announcing nCircle Proactive Security Seminars 2004, sponsored by nCircle and Cisco Systems. Security experts know that most network attacks are designed to exploit known vulnerabilities. So it's no surprise that the most effective security solutions identify and eliminate these vulnerabilities before an incident occurs. These FREE seminars will...

    Provided By nCircle

  • Webcasts // Jan 2009

    Network Topology Analysis: The Most Effective Way to Prioritize Security Initiatives

    The rate of discovery of new vulnerabilities continues to increase, and security and operations teams simply do not have the resources to keep up. The attendee will learn how nCircle's new Topology Risk Analyzer prioritizes risk remediation using vulnerability and network topology-line of sight-risk, enabling IT staff to focus on...

    Provided By nCircle

  • Webcasts // Jan 2009

    Analyzing Your Network Security Risk With nCircle's Suite360 Intelligence Hub

    The attendee of this webcast will discover how to take advantage of IP360's open architecture to integrate the network intelligence gathered by IP360 and the existing systems and leverage that intelligence to measure, manage, and reduce network risk. The attendee will learn how nCircle's Security Intelligence Hub goes beyond simply...

    Provided By nCircle

  • Webcasts // Jan 2009

    Internal Security Compliance and Best Practices

    The presenter of this webcast will show how to measure, manage and improve the internal security posture, as well as streamline the compliance processes. The presenter will outline the most effective compliance strategies like base-lining and trending using nCircle's IP360 Vulnerability Management System. The attendee will also learn best practices...

    Provided By nCircle

  • Webcasts // Jan 2009

    Security Best Practices and Sarbanes-Oxley Compliance

    The attendee of this webcast will learn how Centillium is using nCircle's Sarbanes-Oxley Compliance Solution to measure and manage ongoing compliance efforts. Public companies in the US are required to meet a standard of due care and prove their due diligence to auditors, and IP360 automates much of the repetitive,...

    Provided By nCircle

  • White Papers // Aug 2009

    CSO's Guide to Security and Compliance

    Security and compliance are the leading concerns of CSOs today. These can be difficult areas to navigate due to the increase in number and complexity of regulations, the constant changing threat environment and the economic pressure to reduce costs. IT teams need solutions that make security and compliance easier, more...

    Provided By nCircle

  • White Papers // Dec 2008

    nCircle Solutions for NERC CIP Compliance

    The original guidelines addressing cyber security in the energy infrastructure are known as NERC 1200 UAS. This standard was passed in 2003, in response to the Homeland Security Act of 2002. It was designed to reduce the overall vulnerability of bulk electric systems to cyber threats. However, NERC 1200 was...

    Provided By nCircle

  • White Papers // Nov 2008

    Automating HIPAA Compliance With Security and Configuration Auditing

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was designed to ensure that people who changed jobs or residences did not lose their health insurance. As the legislation was drafted, a rule was added to protect the privacy of individuals' personal health information - the Privacy Rule -...

    Provided By nCircle

  • White Papers // Mar 2009

    Change Is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself About Changes to Your Network

    This whitepaper lists 10 ways that enterprise environments typically change and what one can do to identify, analyze and manage these changes and their associated risks on an ongoing basis. Any device attached to network without authorization is a rogue device. Since these devices fall outside official network inventories, legacy...

    Provided By nCircle

  • White Papers // Jun 2009

    Top 10 Tangible Measures for Effective Security Risk Management

    Visibility and measurement are the very heart of security risk management. Without them it would be impossible to identify, assess and mitigate risks. They are also the key to effective process management. Identifying appropriate metrics ideally requires a consideration of the organization's business goals, strategies and compliance requirements, and the...

    Provided By nCircle

  • Related Offers // Feb 2004

    Proactive Network Security Seminar 2004

    Announcing nCircle Proactive Security Seminars 2004, sponsored by nCircle and Cisco Systems. Security experts know that most network attacks are designed to exploit known vulnerabilities. So it's no surprise that the most effective security solutions identify and eliminate these vulnerabilities before an incident occurs. These FREE seminars will...

    Provided By nCircle

  • Webcasts // Jan 2009

    Beyond Post It Notes & Patches

    This webcast throws about the challenges of IT Security and a review the five requirements for success that can help to change the culture of IT for improved security and compliance.

    Provided By nCircle

  • Webcasts // Jan 2009

    Sarbanes-Oxley Compliance Leveraging Automated Control Objective Auditing

    The attendee of this webcast will gain the insights and guidance one need to measure compliance, reduce manual efforts, and streamline executive and auditor reporting.

    Provided By nCircle

  • Webcasts // Jan 2009

    Web Applications and Information Security Tools and Tactics

    The attendee will learn how operational assessment of web applications can be effectively combined with vulnerability management using nCircle's WebApp360.

    Provided By nCircle

  • Webcasts // Jan 2009

    Automating Security & FDCC Compliance Auditing

    This webcast will provide a comprehensive overview and demonstration of nCircle's Configuration Compliance Manager. The attendee will learn how nCircle with SCAP-validated solutions can help to comply with policy and leverage the same technology to improve overall network security.

    Provided By nCircle

  • Webcasts // Jan 2009

    Using nCircle PCI Solutions to Stay Compliant

    The attendee of this webcast will learn how to achieve and maintain PCI compliance using nCircle's Certified PCI Scan Service, nCircle Configuration Compliance Manager, nCircle File Integrity Monitoring and Suite360 Intelligence Hub.

    Provided By nCircle

  • Webcasts // Jan 2009

    Best Practices For Effective IT Governance, Security Risk and Compliance

    The presenter will examine key enablers in the emerging discipline of strategic IT operations risk management driven by the convergence of regulatory compliance and security requirements. He will demonstrate how change and configuration discipline supports effective IT governance.

    Provided By nCircle

  • Webcasts // Jan 2009

    Fearless e-Commerce: Implementing File Integrity Monitoring for Security and PCI Compliance

    The presenter of this webcast talks about ensuring the integrity of the payment network to increase customer confidence during online transactions with the business.

    Provided By nCircle

  • Webcasts // Jan 2009

    Standardizing Security Operations: Using NIST?s Security Content Automation Program (SCAP) to Increase Security and Network Performance and Lower Operating Costs

    The presenter of this webcast gives an overview and demonstration of how NIST's Security Content Automation Program (SCAP) can be beneficial in achieving compliance with the Federal Information Security Management Act (FISMA) and other compliance requirements and how adoption increases security, increases network performance, and lowers operating costs.

    Provided By nCircle

  • Webcasts // Jan 2009

    Saving Money, Reducing Risk: Continuous Configuration Auditing Using Industry Standards and Benchmarks

    The presenter gives best practices in establishing a security risk and configuration management program incorporating the security configuration benchmarks from CIS. This demonstrated, integrated approach to risk management will reduce manual efforts, save money and enable repeatable and consistent results.

    Provided By nCircle

  • Webcasts // Jan 2009

    PCI V1.1: How Not to Become a Headline

    The Payment Card Industry (PCI) continues to demand the highest levels of protection of cardholder data and security of payment systems, making comprehensive, continuous PCI compliance a daunting task. The presenter address topics like the best practices for PCI compliance, creating a comprehensive, sustainable PCI security risk management program, choosing...

    Provided By nCircle

  • Webcasts // Jan 2009

    Solving the Risk & Compliance Equation With Agentless Technology

    Security risk and compliance management poses unique challenges to large enterprises, and the solution lies in automated, agentless network discovery. The presenter will demonstrate of how nCircle's patented discovery technology, multi-level reporting, and focused analytics can improve security and operational effectiveness.

    Provided By nCircle

  • Webcasts // Jan 2009

    Hackers, Generals, and Wall Street: Applying Cross-Discipline Risk Management Strategies to Network Security

    Information security professionals regularly discuss the nature of risk in the IT environment; however, there is a great deal to learn about risk management from other disciplines. The presenter will examine risk management models from a military operations and financial services perspective and discuss the applicability of lessons learned over...

    Provided By nCircle

  • Webcasts // Jan 2009

    Standardizing Security: The Role of Current and Emerging Security Standards in Vulnerability and Risk Management

    Enterprises in every industry rely on rules for interoperability that are governed by agreed industry standards. As the vulnerability and risk management market matures, many standards are emerging to create common measurements of risk. The presenter will discuss current and developing standards and help identify which ones are important to...

    Provided By nCircle

  • Webcasts // Jan 2009

    Operationalizing Risk Management: A Metrics-Based Approach to Comprehensive Risk Management

    The next generation of security best practices relies on a metrics-driven, risk-focused approach. The presenter will share the approach successfully implemented around the world by the US Agency for International Development (USAID). This approach is now a best practice - as USAID is the only Federal agency to earn a...

    Provided By nCircle

  • Webcasts // Jan 2009

    Quantifying Network Risk: Using nCircle's Unique Approach to Solve the Network Security Challenge

    Understanding what devices and exposures exist on the network is a critical first step to vulnerability management. Effective risk management, however, also requires the ability to rank identified risks to prioritize remediation. This scoring enables organizations to measure remediation effectiveness and track changes in their risk posture over time. This...

    Provided By nCircle

  • Webcasts // Jan 2009

    Three Steps to PCI Compliance: Meeting the PCI Network Scanning Requirements

    Complying with the Payment Card Industry (PCI) Data Security Standard can be confusing, time-consuming and resource-intensive. With fines of up to $500,000 for non-compliance, the ability to rapidly demonstrate compliance is important. This webcast will help to navigate through the PCI Data Security Standard guidelines and show how nCircle solutions...

    Provided By nCircle

  • Webcasts // Jan 2009

    Doomsday Scenarios: Understanding the Variables Driving Doomsday Scenarios and Strategies to Protect Your Organization

    The presenter illuminates the latest challenges facing security professionals in the constantly evolving threat landscape. The presenter discusses issues on the security and threat horizon that enterprises need to prepare for today: What are the disruptions and attacks that threaten businesses and the economy? What are the variables driving them?...

    Provided By nCircle

  • Webcasts // Jan 2009

    Beyond Reporting: Instant, Actionable Security Data Analysis

    The presenter of this webcast throws light on the next major advancement in network security data analysis. The presenter will show five real-world scenarios that show how nCircle Focus can save the valuable time and have an immediate impact in the organization.

    Provided By nCircle

  • Webcasts // Jan 2009

    nCircle Security Risk Management Solution Overview

    Interested in measuring, managing, and reducing the network security risk? The presenter gives an overview of the Security Risk Management solutions that help lower the overall network security risk using fewer resources at the lowest possible cost.

    Provided By nCircle

  • Webcasts // Jan 2009

    Leveraging Vulnerability and Risk Management to Achieve Comprehensive, Sustainable Compliance

    While the topic of risk management is not new, what is new is the need to identify formalized solutions to measure, manage, and reduce risk. These same solutions can be used to audit and illustrate the success of an organization's efforts to achieve regulatory and policy compliance. The attendee of...

    Provided By nCircle

  • Webcasts // Jan 2009

    The Changing Threat Environment: Staying Ahead of the Curve

    The vulnerability management industry has evolved significantly from the early days of attack-driven tools to the enterprise-wide compliance and topological discovery that is currently the norm. The presenter will highlight the important trends in vulnerability management and discuss current and future approaches to security and risk management.

    Provided By nCircle

  • Webcasts // Jan 2009

    nCircle Focus: Improving Security Operations With Active Data Analysis

    Enterprise security teams are stretched to their limit every day and are forced to make difficult decisions about where to spend their time. What they need is comprehensive network and risk information at their fingertips that they can analyze and synthesize instantly as the threat environment changes. The attendee will...

    Provided By nCircle

  • Webcasts // Jan 2009

    USAID Case Study: A Risk Management Approach to Security Compliance

    The United States Agency for International Development (USAID) provides economic and humanitarian assistance in more than 100 countries. USAID is the only Federal agency to receive an A+ in their Federal Information Security Management Act (FISMA) scoring for two consecutive years. nCircle is the foundation technology used to deliver these...

    Provided By nCircle

  • Webcasts // Jan 2009

    Cultivating the Enterprise for Proactive Network Security

    Most individuals and ultimately organizations as a whole do not understand the value of information security until there is loss. Until one have a toothache, his/her brushing regimen might be less than perfect. Getting an organization to take a more active role in information security is an essential change for...

    Provided By nCircle

  • Webcasts // Jan 2009

    Security - The Business Challenge

    The presenter of this webcast will discuss how objective security metrics like advanced analytics and dashboard reporting can help enterprises tackle the challenges associated with safeguarding their networks and business critical assets and data.

    Provided By nCircle

  • Webcasts // Jan 2009

    Deperimiterization - Building a Multi-Level Security Strategy to Prevent Infiltration

    With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage...

    Provided By nCircle