Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Dec 2014

    Test Driven Security Testing

    As more and more businesses are moving to rapid application development frameworks, and methodologies. The presenter find that testing within these constructs to become more difficult due to shorter cycles, incomplete applications, limited staff and resources. How do they test within these frameworks leveraging existing people, and infrastructure to provide...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    What Dungeons and Dragons Taught Me About Infosec - Lostknowledge

    What can anyone possible learn about working in the information security world from a library of fantasy books, stacks of paper character sheets and handfuls of plastic polyhedrons? Surprisingly quite a bit. In this webcast, the presenter will dive into some of the core background behind Dungeons and Dragons (and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Statistically Effective Protection Against APT Attacks

    There are a lot of different hardening and best practice guides available which tell how operating system and applications should be hardened against attacks. However, as anyone who has worked with corporate security knows, implementing hardening at corporate level is a rather expensive operation - and thus there is significant...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Model Bedfellows

    The penetration test finds a bug in the code that was coded four months ago and could have been prevented a year ago during requirements gathering. The vendor says they will fix it shortly after the software launches - if a change order is issued and they're paid for their...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Investigating Powershell Attacks

    Over the past two years, the presenters have seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If the user's organization is running Windows 7 or Server 2008 R2, they've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!).

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Automatically Detecting Vulnerable Websites Before They Turn Malicious

    Significant recent research advances have made it possible to design systems that can automatically determine with high accuracy the maliciousness of a target website. While highly useful, such systems are reactive by nature. In this webcast, the presenter will take a complementary approach, and attempt to design, implement, and evaluate...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Analysis of a Full-Body Scanner

    Advanced imaging technologies are a new class of people screening systems used at airports and other sensitive environments to detect metallic as well as nonmetallic contraband. The presenter presents the first independent security evaluation of such a system, the Rapiscan secure 1000 full-body scanner, which was widely deployed at airport...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    RAVAGE: Runtime Analysis of Vulnerabilities And Generation of Exploits

    In this webcast, the presenters will show cutting edge research and a tool built to accurately detect vulnerabilities. The tool leverages the standard program execution to detect the full dataflow of vulnerabilities at runtime. It can be used both offensively and defensively. They will show how RAVAGE can be used...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    CloudBots Harvesting Crypto Coins Like a Botnet Farmer

    In this webcast, the presenters explore just how easy it is to generate massive amounts of unique email addresses; in order to register free trial accounts, deploy code, and distribute commands. They managed to build this cloud-based botnet all for the low cost and semi-legally. This botnet doesn't get flagged...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Probabilistic Spying on Encrypted Tunnels

    At the network layer, encrypted tunnels are typically seen as black boxes. Network traffic however, leaks side channel information that can often be analyzed to determine what the tunnel is being used for and the type of content being sent over it. Probabilistic algorithms will be explored that can analyze...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    I Know Your Filtering Policy Better Than You Do: External Enumeration and Exploitation of Email and Web Security Solutions

    Email and web filtering products and services are core components for protecting company employees from malware, phishing and client-side attacks. However, it can be trivial for an attacker to bypass these security controls if they know exactly what products and services are in use, how they are configured, and have...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Wins Again Why TLS Keeps Failing to Protect HTTP

    SSL has been around for decades and yet it keeps happening: new attacks are being discovered against TLS at a steady rate. The past year has seen its share of rogue CA certificates and critical vulnerabilities in TLS libraries that the people have come to expect. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Protecting Data In-Use From Firmware and Physical Attacks

    Recent revelations of the NSA ANT program illustrated the many well-known and low-cost physical and firmware attacks that can compromise data in-use and system integrity. These attacks have become more concerning as more computing infrastructure runs outside an organization's physical control. In this webcast, the presenter will review several such...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    A Survey of Remote Automotive Attack Surfaces

    Automotive security concerns have gone from the fringe to the mainstream with security researchers showing the susceptibility of the modern vehicle to local and remote attacks. A malicious attacker leveraging a remote vulnerability could do anything from enabling a microphone for eavesdropping to turning the steering wheel to disabling the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Dynamic Flash Instrumentation for Fun and Profit

    Many of the latest flash exploits seen in the wild (CVE-2013-5329, CVE-2013-5330, CVE-2014-0497, etc.) are protected with commercial tools like DoSWF and secureSWF. Malicious flash redirectors are also utilizing the same tools.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    My Google Glass Sees Your Passwords

    In this webcast, the presenter will introduce a novel computer vision based attack that automatically discloses inputs on a touch enabled device. The presenter's spying camera, including Google Glass, can take a video of the victim tapping on the touch screen and automatically recognize more than 90% of the tapped...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

    Attacking the modern browser and its plugins is becoming harder. Vendors are employing numerous mitigation technologies to increase the cost of exploit development. An attacker is now forced to uncover multiple vulnerabilities to gain privileged-level code execution on their targets.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exposing Bootkits with BIOS Emulation

    The security features added in modern 64-bit versions of Windows raise the bar for kernel mode rootkits. Loading unsigned drivers, which is what most rootkits will attempt to do, is denied by driver signature enforcement. PatchGuard protects the integrity of the running kernel, preventing them from modifying critical structures and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware

    Today, forensics experts and anti-malware solutions face a multitude of challenges when attempting to extract information from malicious files; dynamic analysis (sandboxing) is a popular method of identifying behavior associated with running or opening a given file, and provides the ability to examine the actions which that file is responsible...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Jan 2009

    Lifecycle Quality Management; Infusing and Automating Quality at Every Phase

    When one leave quality to the end, or as someone else's responsibility, it can result in applications that fail to meet the original goals, require costly rework or miss critical release dates. To prevent these problems, one need an advanced approach to managing overall quality throughout the software development lifecycle....

    Provided By Borland

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By TrendMicro

  • Webcasts // Jan 2009

    IDC Presents: Best Practices For Pervasive Business Intelligence

    To improve strategic and operational decision-making, more and more enterprises are pursuing a convergence of organizational culture, business processes and technologies known as Pervasive Business Intelligence. Why the drive to Pervasive BI? Simply put: better business performance. The attendee of this webcast will learn best practices for achieving Pervasive BI...

    Provided By JasperSoft

  • Webcasts // Aug 2008

    Keep Your Auditors Happy With PowerTech Compliance Monitor

    This webcast covers use of PowerTech Compliance Monitor to prepare a system for a SOX, PCI, COBIT or ISO audit.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Protect System i (AS/400) Data from FTP, ODBC and Remote Command

    The attendee of this webcast will learn more about System i security and how to close the "Backdoors" not covered by traditional menu security schemes - including FTP, ODBC, and Remote Commands - as well as how to implement policy to restrict access.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Powerful Profiles, Regulations, and You

    This webcast covers the use of PowerTech Authority Broker to manage powerful users.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Understanding Compliance Reporting on the System i

    The attendee of this webcast will learn what the auditors will be asking for when they arrive on site.

    Provided By PowerTech Group

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    How to Prevent a Data Leak

    A data breach is a leak of information into a non-trusted environment, and discovered occurrences are growing exponentially. Data leakage can be the result of accidental or malicious intent, but unlike any other form of "Loss" often leaves the compromised data intact and therefore a challenge to discover. The attendee...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Configuring Real-time Security Event Notification

    The IBM i operating system includes a facility to audit system and user events. However, once the event data is collected the challenge becomes how to disseminate the raw data into useful information, and how to do it in real-time.

    Provided By PowerTech Group

  • Webcasts // Jun 2009

    The State of System i (AS/400) Security 2009

    The presenter will review a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Ambush Hackers With Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired'', an increasing number of people need to understand the basics of security in a networked world. This webcast shows how to ambush hackers with network security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Preserving the Integrity of Security Events on IBM i (AS/400)

    The presenter of this webcast shows how to preserve the integrity of security events through an overview of journaling, messages, system values, and other keys tools on IBM i, along with resources for auditors.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The State of System i (AS/400) Security

    The presenter of this webcast reviews a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The Top 5 System i Security Risks

    The attendee will learn how a Security Assessment from PowerTech can uncover security vulnerabilities and provide recommendations to key challenges companies face when complying with government regulations.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Simplifying Compliance & Vulnerability Management on the IBM AS/400

    The presenter of this webcast focuses specifically on Host Application Security, Vulnerability Management and Compliance Reporting. The presenter will demonstrate how to simplify the ever-increasing compliance burden while improving overall security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    On-Demand Webcast: Database Attack Prevention With Change and Vulnerability Management

    Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Protecting Against Database Attacks and Insider Threats: Top 5 Scenarios

    The attendee of this webcast will learn the top 5 scenarios and essential best practices for preventing database attacks and insider threats, as well as best practices for reducing compliance complexity by automating and centralizing cross-DBMS controls for key regulations such as SOX/COBIT, PCI-DSS, NIST 800-53, SAS70 and data protection...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Best Practices for Data Privacy & Protection

    The attendee of this webcast will learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organizations to carefully review their...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium