Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Apr 2009

    Case Study Webinar? How to Secure Your Cisco WLAN Today

    This webcast will give attendees a real life case study of how one organization avoided pitfalls while expanding and remediating it's Cisco WLAN and achieved the best performance and robust and accurate wireless security for mission critical applications it was running over wireless.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    PCI DSS and the Wireless Connection: Pay Attention - TJX Was No Accident!

    There's a New Sherriff in Town and He's Getting Tough on Wireless Security. His name is the PCI DSS 1.2 and wireless security has finally been recognized as an important component of protecting the network and the WLAN.

    Provided By AirTight Networks

  • Webcasts // Oct 2009

    Preparing for a Wireless Audit for PCI DSS Compliance

    Whether or not wireless is deployed in the cardholder data environment, every organization subject to PCI has a minimum set of wireless security requirements. Preparing the organization to comply with the PCI DSS Wireless Requirements does not have to be a daunting task. The presenters of this webcast will demystify...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Case Study Webinar - How to Secure Your Cisco WLAN Today

    This webcast shows how to secure Cisco WLAN. The attendee will learn about the Effective pre-deployment planning including predictive RF planning, RF site survey, etc. The presenter gives key best practices to follow for securing WLAN.

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Conquering the Minefield of Soft Rogue APs in Enterprise Networks

    A soft Access Point (AP)is a device such as a laptop or other wireless enabled device which performs traffic forwarding between its wireless interface and some other interface which is in turn connected to a secure network. The major advantage of using the soft AP is that this can show...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    The Role of PCI in a Security Strategy

    Following multiple data breaches at "PCI Compliant" organizations, there has arisen a chorus of voices who are discovering that complying with PCI does not make an organization secure. This, while not a surprise to anyone who has either looked at PCI or worked in security, is evidently news enough to...

    Provided By Ounce Labs

  • Webcasts // Jan 2009

    The Path to a Secure Application

    The presenter of this webcast details the path one must follow to find and eliminate the coding errors and design flaws that expose data, threaten operations, and cost the organization time and money.

    Provided By Ounce Labs

  • Webcasts // Mar 2009

    Mobile Strategies: Why It's Time to Make the Switch From IPSec to SSL VPN

    In today's economic climate, increasing employee productivity and reducing infrastructure costs are at the top of every organization's agenda. Enabling employees to access network resources, from wherever they are and from whatever device, is a key strategy for improving productivity and saving money. As a result, IT is under pressure...

    Provided By Ziff Davis Enterprise Holdings

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • Webcasts // Nov 2009

    Demystifying DLP: Solving the Mystery of Data Loss

    Companies today are increasingly challenged to protect their sensitive data. Whether they need to protect customer credit card information, patient healthcare records, sensitive intellectual property, non-public financial information or other company data, there are strong drivers for increased vigilance. Additionally, protecting data is becoming more difficult. Innovations in Data Loss...

    Provided By Technology Executives Club

  • Webcasts // Jan 2009

    Authentication's Past, Present and Future

    The presenter of this webcast will explore the topic of authentication completely. It will begin with a look at authentication methods of the past in computing. There will be special attention paid to means of authentication still in use, and a discussion of why those methods are still around. Then...

    Provided By Technology Executives Club

  • Webcasts // Oct 2008

    Identity Life Cycle Management: State of the Union

    What has been a shift change in both the market and technology in identity management is discussed by the presenter. The attendee will learn what those components are and why they are important in articulating the business value of IAM.

    Provided By Technology Executives Club

  • Webcasts // Apr 2008

    TechNet Webcast: 24 Hours of Windows Server 2008 (Part 17 of 24): Migrating to Active Directory Domain Services in Windows Server 2008 (Level 300)

    This webcast series covers best practices to help organizations prepare for deploying Windows Server 2008 Active Directory. The webcast covers planning and prerequisite steps, as well as best practices for which domain controllers to deploy first, how to handle operations master roles, and other domain services such as Domain Name...

    Provided By Microsoft Tips

  • Webcasts // Jan 2009

    Identity-Enabled Web Services - Securing Application Access

    Web Services are becoming the leading method for application-to-application communication across corporate networks and the Internet. Until recently, proprietary end-to-end authentication and authorization schemes violated Web Services design principles and were expensive and difficult to implement and maintain. The emergence of the OASIS "WS-Security" Web Services standards have solved many...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Internet SSO: Build or Buy

    More often than not, today's economy stipulates that the lowest cost solution to satisfy a given business challenge should be utilized. When considering the options for deploying Internet Single Sign-On, User Account Management and Identity-Enabled Web Services, building an in-house solution may at first appear to be the most viable...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Become a Business Hero - The Value of Internet Single Sign-On

    Today's business climate is tough. The ongoing recession has driven virtually every dollar of Capital and Operational Expenditures under a financial microscope. Prospective IT investments must be reinforced with a strong business case in order to gain approval, and those that demonstrate a high return on investment coupled with a...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    What's New With PingConnect? Plenty!

    PingConnect provides on-demand SaaS Single Sign-On and automated user account management that configures in hours and deploys in days with no on-premise hardware or software required. Dozens of SaaS applications are supported, including Salesforce CRM and Google Apps. The attendee will hear what's new with PingConnect. PingConnect is providing an...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Rapid Delivery of Internet SS0 to 60+ Apps

    The attendee of this webcast will learn how PingConnect delivers SaaS Single Sign-on and automated user account management. PingConnect is providing an easy way to universally access multiple SaaS applications without requiring costly and complicated new IT tools and support.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    SIEM & SAML: Secrets to Securing the Cloud

    While CIOs and CISOs are weighing through a broad range of cloud services to cut costs and streamline operations, they all share one common concern: how to retain visibility over user activity when applications move to the cloud? The presenters of this webcast discuss best practices for better security and...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Federated Identity Management: A Comparison of Various Approaches

    This webcast explores the four common methods for achieving Federated Identity Management. The presenters will discuss these approaches and compare the relative costs, benefits, issues and considerations associated with each of them.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Leveraging Federated Identity and Virtual Directories to Deploy Secure Internet Single Sign-On

    According to Gartner Group, both federated identity and virtual directories are well on their way to mainstream market adoption. The attendee will find out how these capabilities can be used together to facilitate implementing SSO with SaaS and BPO providers, business partners and trading partners. The attendee of this webcast...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    The Secret Behind 30 Day Deployments of Secure Internet SSO: PingEnable

    With hundreds of possible ways to implement Single Sign-On (SSO) that works over the Internet, it is easy to see why many organizations' identity federation projects fail. Without an experienced methodology and practice, identity federation projects can take six months or even longer to complete. The attendee of this webcast...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Can Federation Solve the SaaS Phishing Problem?

    News about phishing attacks on SaaS providers has made security a top-of-mind issue with SaaS providers and clients alike. The presenters of this webcast discuss the issues such as what kinds of attacks are taking place? What is at risk? And what role can identity federation play in solving this...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Internet Single Sign-On to SiteMinder

    SiteMinder is the most widely deployed Web Access Management system on the market today. The presenter explores how PingFederate, the market leader in federated identity management, can extend SiteMinder to support internal and external Single Sign-On (SSO).

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Provisioning Options for Internet Single Sign-On

    Internet SSO is great for providing seamless and secure access to Internet-facing applications like SaaS services and supply chain portals. However, some applications require the creation of user accounts in their directories before SSO can take place. PingFederate now has two distinct mechanisms for provisioning user accounts over the Internet:...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Identity Integration for SaaS: Avoiding the Mulitple Directory Nightmare

    Just how should enterprise identity management and outsourced SaaS applications integrate securely? The presenter of this webcast outlines four basic areas of identity integration with SaaS: provisioning, authentication, SSO and authorization. Both the SaaS provider and SaaS customer perspective will be addressed, as both play roles in the SaaS Identity...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Single Sign-On for Salesforce CRM

    Ping Identity automates Salesforce CRM user account management while at the same time providing single sign-on for all of the ways users access it. These solutions deploy rapidly and they work with the existing infrastructure. The presenter will help to explore which Internet SSO Solution for Salesforce CRM is the...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Webinar: 5 Steps to Ensure Security of Internet SSO

    In recent news, phishing attacks have been targeted at the online services and Software as a Service (SaaS) providers are paying the price if they don't protect their customers. No one wants to be front page news for a security breach, that is why one has to protect themselves, whether...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Federated Identity Management: How to Increase Partner Adoption

    The biggest hurdle the customer's face is related to getting all of their Identity Federation partners on the same page. The presenter will review the issues that one can expect to encounter as well as the best practices developed to help to resolve them.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Single Sign-On to Citrix

    Until now, Single Sign-On (SSO) has been limited to web applications. The PingFederate Citrix Integration solution extends the reach of SAML SSO beyond web applications to include any applications that have been virtualized using Citrix Presentation Server. The attendee of this webcast will learn how to reduce IT administration overhead...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Easy Endpoint Connectivity Through SAML-Based Internet SSO

    A common challenge shared by Identity and Service Providers who have standardized on SAML technologies for Internet Single Sign-On often occurs when the "Partner" side of the desired SAML connection, referred to as an "Endpoint," does not support SAML. This often requires the Endpoint partner to undertake a full-scale SAML...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Internet Single Sign-On for Service Providers

    If a customer called and wants single sign-on that works over the Internet and that all of their security policies are maintained as well. This is not the first time the request from a customer or partner for single sign-on has come in, but this time there is no procrastinating....

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Reduce Account Sharing With Federated Single Sign-On

    The attendee of this webcast will discover how Federated Single Sign-On can help to eliminate account sharing while delivering higher levels of service to the customers. A common problem for Software on Demand vendors is unauthorized user account sharing. According to research conducted by the Information Systems Security Association, 64%...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Strategies for Making OpenID More Secure

    OpenID has attracted a lot of attention lately, but security experts are warning of significant vulnerabilities with the system. The attendee of this webcast will learn how to improve the security of OpenID deployments. Plus, attendee will have the opportunity to see secure OpenID in action.

    Provided By Ping Identity