Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Dynamic Flash Instrumentation for Fun and Profit

    Many of the latest flash exploits seen in the wild (CVE-2013-5329, CVE-2013-5330, CVE-2014-0497, etc.) are protected with commercial tools like DoSWF and secureSWF. Malicious flash redirectors are also utilizing the same tools.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    My Google Glass Sees Your Passwords

    In this webcast, the presenter will introduce a novel computer vision based attack that automatically discloses inputs on a touch enabled device. The presenter's spying camera, including Google Glass, can take a video of the victim tapping on the touch screen and automatically recognize more than 90% of the tapped...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

    Attacking the modern browser and its plugins is becoming harder. Vendors are employing numerous mitigation technologies to increase the cost of exploit development. An attacker is now forced to uncover multiple vulnerabilities to gain privileged-level code execution on their targets.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exposing Bootkits with BIOS Emulation

    The security features added in modern 64-bit versions of Windows raise the bar for kernel mode rootkits. Loading unsigned drivers, which is what most rootkits will attempt to do, is denied by driver signature enforcement. PatchGuard protects the integrity of the running kernel, preventing them from modifying critical structures and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware

    Today, forensics experts and anti-malware solutions face a multitude of challenges when attempting to extract information from malicious files; dynamic analysis (sandboxing) is a popular method of identifying behavior associated with running or opening a given file, and provides the ability to examine the actions which that file is responsible...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Practical Attack Against Virtual Desktop Infrastructure (VDI) Solutions

    The secure BYOD hype is growing and Virtual Desktop Infrastructure (VDI) is considered the alternative solution for secure containers. In a nutshell, VDI solutions provide a remote workstation offering so that no data is stored locally. The presenter decided to examine the architecture and see for themselves whether VDI delivers...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Catching Malware En Masse DNS and IP Style

    The Internet is constantly growing, providing a myriad of new services both legitimate and malicious. Criminals take advantage of the scalable, distributed, and rather easily accessible naming, hosting and routing infrastructures of the Internet. As a result, the battle against malware is raging on multiple fronts: the endpoint, the network...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Threat Intelligence Library - A New Revolutionary Technology to Enhance the SoC Battle Rhythm

    Cyber indicators are the 'New-er' detection strategy to help dismantle adversarial assaults and the volume of crowd sourced and private community malicious IOCs grows exponentially every day forcing the security industry to create a new must have tool - a threat library.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring

    In this webcast, the presenter will describe the different techniques available for data analysis and machine learning for information security, and discuss their strengths and caveats. The ghost of marketing past will also show how similar the unfulfilled promises of deterministic and exploratory analysis were, and how to avoid making...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Creating a Spider Goat: Using Transactional Memory Support for Security

    Often a solution from one area helps solve problems in a completely different field. In this webcast, the presenter will show, how Intel CPU improvements designed to speed up computations have boosted security by creating a flexible memory monitor capable of detecting and reversing unauthorized memory changes.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    How to Wear Your Password

    In this webcast, the presenter will introduce a new authentication paradigm that achieves both a desirable user experience and a high level of security. The presenter describes and demos an implementation of an identity manager in the guise of a smart bracelet.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The New Scourge of Ransomware a Study of Cryptolocker and Its Friends

    In this webcast, the presenter will focus on what the threat intelligence community did in response to this threat, including the development of near-time tracking of its infrastructure and what can be learned in order to manage new threats as they emerge.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    One Packer to Rule Them All: Empirical Identification, Comparison, and Circumvention of Current Antivirus Detection Techniques

    Lately, many popular anti-virus solutions claim to be the most effective against unknown and obfuscated malware. Most of these solutions are rather vague about how they supposedly achieve this goal, making it hard for end-users to evaluate and compare the effectiveness of the different products on the market.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Prevalent Characteristics in Modern Malware

    Malware is widely acknowledged as a growing threat with hundreds of thousands of new samples reported each week. Analysis of these malware samples has to deal with this significant quantity but also with the defensive capabilities built into malware.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hunting Malware on Linux Production Servers: The Windigo Backstory

    Operation Windigo is a large server, side malware campaign that targets Unix systems (BSD, Linux, etc.). There are three major components: Linux/Ebury an OpenSSH backdoor and credential stealer, Linux/Cdorked a Web Server backdoor (it works with Apache, Nginx and Lighttpd) that redirects end users to exploit kits, and Perl/Calfbot a...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Internet of Insecure Things: 10 Most Wanted List

    In this webcast, the presenter explains about the history of embedded device insecurity. The presenter will also explore some real-world example of how devices are exploited (and attackers profited). The user will also learn what they can do to help fix these problems and push the industry for a much...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Jan 2009

    Lifecycle Quality Management; Infusing and Automating Quality at Every Phase

    When one leave quality to the end, or as someone else's responsibility, it can result in applications that fail to meet the original goals, require costly rework or miss critical release dates. To prevent these problems, one need an advanced approach to managing overall quality throughout the software development lifecycle....

    Provided By Borland

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By TrendMicro

  • Webcasts // Jan 2009

    IDC Presents: Best Practices For Pervasive Business Intelligence

    To improve strategic and operational decision-making, more and more enterprises are pursuing a convergence of organizational culture, business processes and technologies known as Pervasive Business Intelligence. Why the drive to Pervasive BI? Simply put: better business performance. The attendee of this webcast will learn best practices for achieving Pervasive BI...

    Provided By JasperSoft

  • Webcasts // Aug 2008

    Keep Your Auditors Happy With PowerTech Compliance Monitor

    This webcast covers use of PowerTech Compliance Monitor to prepare a system for a SOX, PCI, COBIT or ISO audit.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Protect System i (AS/400) Data from FTP, ODBC and Remote Command

    The attendee of this webcast will learn more about System i security and how to close the "Backdoors" not covered by traditional menu security schemes - including FTP, ODBC, and Remote Commands - as well as how to implement policy to restrict access.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Powerful Profiles, Regulations, and You

    This webcast covers the use of PowerTech Authority Broker to manage powerful users.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Understanding Compliance Reporting on the System i

    The attendee of this webcast will learn what the auditors will be asking for when they arrive on site.

    Provided By PowerTech Group

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    How to Prevent a Data Leak

    A data breach is a leak of information into a non-trusted environment, and discovered occurrences are growing exponentially. Data leakage can be the result of accidental or malicious intent, but unlike any other form of "Loss" often leaves the compromised data intact and therefore a challenge to discover. The attendee...

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Configuring Real-time Security Event Notification

    The IBM i operating system includes a facility to audit system and user events. However, once the event data is collected the challenge becomes how to disseminate the raw data into useful information, and how to do it in real-time.

    Provided By PowerTech Group

  • Webcasts // Jun 2009

    The State of System i (AS/400) Security 2009

    The presenter will review a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Ambush Hackers With Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired'', an increasing number of people need to understand the basics of security in a networked world. This webcast shows how to ambush hackers with network security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Preserving the Integrity of Security Events on IBM i (AS/400)

    The presenter of this webcast shows how to preserve the integrity of security events through an overview of journaling, messages, system values, and other keys tools on IBM i, along with resources for auditors.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The State of System i (AS/400) Security

    The presenter of this webcast reviews a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    The Top 5 System i Security Risks

    The attendee will learn how a Security Assessment from PowerTech can uncover security vulnerabilities and provide recommendations to key challenges companies face when complying with government regulations.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Simplifying Compliance & Vulnerability Management on the IBM AS/400

    The presenter of this webcast focuses specifically on Host Application Security, Vulnerability Management and Compliance Reporting. The presenter will demonstrate how to simplify the ever-increasing compliance burden while improving overall security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    On-Demand Webcast: Database Attack Prevention With Change and Vulnerability Management

    Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Protecting Against Database Attacks and Insider Threats: Top 5 Scenarios

    The attendee of this webcast will learn the top 5 scenarios and essential best practices for preventing database attacks and insider threats, as well as best practices for reducing compliance complexity by automating and centralizing cross-DBMS controls for key regulations such as SOX/COBIT, PCI-DSS, NIST 800-53, SAS70 and data protection...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Best Practices for Data Privacy & Protection

    The attendee of this webcast will learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organizations to carefully review their...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium

  • Webcasts // Jan 2009

    How Dell IT Simplified Database Security for SOX, PCI, SAS 70

    The attendee of this webcast will learn how to simplify database security and compliance - without impacting performance or creating more work for the DBAs and security teams. The attendee will also learn how Dell's IT group replaced its homegrown scripts and native database auditing with Guardium's automated, cross-DBMS platform...

    Provided By Guardium