Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Aug 2014

    Bring Your Own Risky Apps

    Bring Your Own Device (BYOD) is a cute and harmless-sounding acronym for a trend that is in reality introducing exponentially more risk to end-users and organizations. The common refrain is to seek out and secure the user's Smartphone's and tablets from malware and other malicious software which can wreck havoc...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    A Better Way to Get Intelligent About Threats

    A recent ponemon report on exchanging cyber threat intelligence states that current threat sharing mechanisms are broken. A threat intelligence platform should achieve many things, but most importantly it should offer a singular platform to aggregate, analyze, and act on threat intelligence data as well as offer options for context,...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Video: Cognizant delivers reliable, scalable knowledge management support

    This leading provider of IT consulting and business processes achieves an 80 percent reduction in client ticket volumes and a 40 percent improvement in mean-time-to-resolution rates with IBM SmartCloud Control Desk software.

    Provided By IBM

  • Webcasts // Jul 2014

    On-demand Webcast: UK Threat Landscape..

    There have been multiple high profile worldwide data breaches so far in 2014. Do you wonder what's happening on the UK Threat Landscape? Join Rackspace and Alert Logic to hear more about malicious cybercrime, the evolution of hackers, how the underground economy works and how it affects the corporate IT...

    Provided By Alert Logic

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // May 2014

    Make the Hybrid Cloud work for you

    Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics...

    Provided By IBM

  • Webcasts // May 2014

    Breakthrough "big data" storage solutions: IBM System x GPFS Storage Server

    This webcast short spotlights breakthrough “big data” storage solutions using IBM System x GPFS Storage Server -- a ground breaking, modular solution that can be optimized to balance client needs in terms of performance, capacity, cost and scale. This webcast short also shares capabilities in the broader IBM technical computing...

    Provided By IBM

  • Webcasts // Apr 2014

    Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Mar 2014

    On-demand Webcast: How to Protect and Recover SharePoint Data

    Microsoft SharePoint is an amazingly popular solution for sharing and centralizing control over important business data. Join us as we talk about the value of virtualizing your SharePoint infrastructure and the benefits of using Veeam® Backup & Replication™ to protect the valuable data that resides in your SharePoint databases. ...

    Provided By Veeam Software

  • Webcasts // Mar 2014

    On-demand Webcast - Virtualizing Exchange: Protection made easy

    Have you held off virtualizing Exchange? If so, what Rick Vanover from Veeam has to show you may be enough to convince you to change! Join this webinar to see how you can successfully virtualize and protect Exchange while giving benefits you never thought possible. You will see...

    Provided By Veeam Software

  • Webcasts // Mar 2014

    On-demand Webcast: Smart Strategies for Data Backup and Recovery

    Everyone knows the dire consequences of data loss. The key is how to work pre-emptively to avoid them by employing smart strategies for backup and recovery. Smart strategies are centered around an essential understanding of why systems fail and what can be done to play it safe with your...

    Provided By Unitrends

  • Webcasts // Mar 2014

    On-demand Webcast - IT Risk Management: Why it is a Critical Component of Your Business Strategy

    In today’s business environment, ongoing increases in cyber-security attacks, “cyber-terrorism” and other IT security threats are forcing corporations to evolve their understanding of the value of IT risk management and its importance to business success. What used to be viewed as a compliance function is now considered a critical strategic...

    Provided By IBM

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Provided By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Provided By Dell Software

  • Webcasts // Feb 2014

    On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

    Provided By ZDNet

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: 2014 Email Predictions From The Most Interesting Man in Email Today

    Join the man who made CMO Magazine’s list of “50 Marketing Leaders You Should Know” for a scintillating sneak peek into what email leaders today are most concerned about. Bill McCloskey, founder of TheOneHundredClub.org, eDataSource.com and Only Influencers, has his finger on the pulse of what’s happening in email today....

    Provided By Message Systems

  • Webcasts // Feb 2014

    Forrester CI Webcast

    This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Provided By Box

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Identity and Security Services Video

    In this webcast, the presenter gives an overview of Novell services for identity and security. The presenter also explains about different identity strategy, web access management, security audit, identity management deployment and password management.

    Provided By Novell

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Novell Cloud Security Service

    In this webcast, the presenter going to show the users' how they can harness the technology of the future with Novell Cloud Security Service. The presenter also going to explain about how service providers can manage multi-tenant SaaS infrastructures.

    Provided By Novell

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Sponsored By Druva Software

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Jan 2009

    Lifecycle Quality Management; Infusing and Automating Quality at Every Phase

    When one leave quality to the end, or as someone else's responsibility, it can result in applications that fail to meet the original goals, require costly rework or miss critical release dates. To prevent these problems, one need an advanced approach to managing overall quality throughout the software development lifecycle....

    Provided By Borland

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By TrendMicro

  • Webcasts // Jan 2009

    IDC Presents: Best Practices For Pervasive Business Intelligence

    To improve strategic and operational decision-making, more and more enterprises are pursuing a convergence of organizational culture, business processes and technologies known as Pervasive Business Intelligence. Why the drive to Pervasive BI? Simply put: better business performance. The attendee of this webcast will learn best practices for achieving Pervasive BI...

    Provided By JasperSoft

  • Webcasts // Aug 2008

    Keep Your Auditors Happy With PowerTech Compliance Monitor

    This webcast covers use of PowerTech Compliance Monitor to prepare a system for a SOX, PCI, COBIT or ISO audit.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Protect System i (AS/400) Data from FTP, ODBC and Remote Command

    The attendee of this webcast will learn more about System i security and how to close the "Backdoors" not covered by traditional menu security schemes - including FTP, ODBC, and Remote Commands - as well as how to implement policy to restrict access.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Powerful Profiles, Regulations, and You

    This webcast covers the use of PowerTech Authority Broker to manage powerful users.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Understanding Compliance Reporting on the System i

    The attendee of this webcast will learn what the auditors will be asking for when they arrive on site.

    Provided By PowerTech Group

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    How to Prevent a Data Leak

    A data breach is a leak of information into a non-trusted environment, and discovered occurrences are growing exponentially. Data leakage can be the result of accidental or malicious intent, but unlike any other form of "Loss" often leaves the compromised data intact and therefore a challenge to discover. The attendee...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Configuring Real-time Security Event Notification

    The IBM i operating system includes a facility to audit system and user events. However, once the event data is collected the challenge becomes how to disseminate the raw data into useful information, and how to do it in real-time.

    Provided By PowerTech Group

  • Webcasts // Jun 2009

    The State of System i (AS/400) Security 2009

    The presenter will review a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Ambush Hackers With Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired'', an increasing number of people need to understand the basics of security in a networked world. This webcast shows how to ambush hackers with network security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Preserving the Integrity of Security Events on IBM i (AS/400)

    The presenter of this webcast shows how to preserve the integrity of security events through an overview of journaling, messages, system values, and other keys tools on IBM i, along with resources for auditors.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The State of System i (AS/400) Security

    The presenter of this webcast reviews a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The Top 5 System i Security Risks

    The attendee will learn how a Security Assessment from PowerTech can uncover security vulnerabilities and provide recommendations to key challenges companies face when complying with government regulations.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Simplifying Compliance & Vulnerability Management on the IBM AS/400

    The presenter of this webcast focuses specifically on Host Application Security, Vulnerability Management and Compliance Reporting. The presenter will demonstrate how to simplify the ever-increasing compliance burden while improving overall security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    On-Demand Webcast: Database Attack Prevention With Change and Vulnerability Management

    Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Protecting Against Database Attacks and Insider Threats: Top 5 Scenarios

    The attendee of this webcast will learn the top 5 scenarios and essential best practices for preventing database attacks and insider threats, as well as best practices for reducing compliance complexity by automating and centralizing cross-DBMS controls for key regulations such as SOX/COBIT, PCI-DSS, NIST 800-53, SAS70 and data protection...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Best Practices for Data Privacy & Protection

    The attendee of this webcast will learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organizations to carefully review their...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium

  • Webcasts // Jan 2009

    How Dell IT Simplified Database Security for SOX, PCI, SAS 70

    The attendee of this webcast will learn how to simplify database security and compliance - without impacting performance or creating more work for the DBAs and security teams. The attendee will also learn how Dell's IT group replaced its homegrown scripts and native database auditing with Guardium's automated, cross-DBMS platform...

    Provided By Guardium

  • Webcasts // Jan 2009

    Achieve Compliance With OMB Data Security Directive for Securing PII Data

    The attendee of this webcast will learn about best practices for securing Personally Identifiable Information (PII) data in sensitive databases and easily complying with OMB M-06-16. According to the OMB directive, government departments and agencies must log all extracts from sensitive databases and verify that private information has been erased...

    Provided By Guardium

  • Webcasts // Jan 2009

    Webcast: What Every CSO Should Know About Database Security

    Regulations such as SOX and PCI, along with high-profile data breaches, have focused attention on ensuring the integrity of corporate data and preventing information leakage from the data center. As a result, the responsibility for implementing data-centric security is moving from database administrators to the IT security organization, which may...

    Provided By Guardium

  • Webcasts // Jan 2009

    Protect Cardholder Data for PCI - Without Database Encryption

    This webcast shows how to protect cardholder data without database encryption.

    Provided By Guardium