Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2012

    George Ilko, Founder and CTO, Vitality Consulting Services

    In this webcast, the presenter explains about Symantec technologies. The presenter also explains about various Symantec technologies which provides them with operational efficiencies while allowing it to deliver optimal services to its clients.

    Provided By Symantec

  • Webcasts // Jan 2012

    Interview With Sandcroft Management Services

    In this webcast, the presenter explains about Symantec data protection and security technologies. The presenter also explains about its play an important role in helping Vitality Consulting Services deliver optimal services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Flexible, Cost-Effective Data Protection and Security for Fast-Growing U.K. Legal Services and Insurance Firm

    In this webcast, the presenter explains about Commitments Protection. The commitments protection a small dynamic insurance services company partnered with the managed services partner Vitality Consulting Services to deploy Symantec System Recovery and Symantec Endpoint Protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    LPI Integration & Symantec Endpoint Protection 12: Partner Thoughts

    In this webcast, the presenters explain about Symantec and its benefits. The presenters also discuss the benefits of standardizing on Symantec Endpoint Protection 12 and the value of holding the SMB Specialization.

    Provided By Symantec

  • Webcasts // Jan 2012

    Continental Technologies (CTI): Security and Data Protection

    In this webcast, the presenters share their facing challenges about security. The presenters also explain how works the security and storage solutions which is provided by Symantec and to help their customers with their IT needs.

    Provided By Symantec

  • Webcasts // Jan 2012

    Secure Cloud Computing - Symantec O3

    In this webcast, the presenter explains about Symantec O3. The Symantec O3 is a cloud information protection platform that provides context-based access control, information security and information management as a service for cloud applications and services.

    Provided By Symantec

  • Webcasts // Jan 2012

    Email Spam Filter & Virus Protection Solution - Symantec.cloud

    In this webcast, the presenter asks how to keep one business safe? The presenter tells about Symantec.cloud Email Security services and its protect against email spam, viruses, phishing and other email threats via the cloud.

    Provided By Symantec

  • Webcasts // Jan 2012

    Web Security - Block Web Threats & Filter Web Content - Symantec.cloud

    In this webcast, the presenter explains about Symantec.cloud. The Symantec.cloud Web Security protects organisations of all sizes against web-based attacks, while also enabling safe and productive use of the web by employees via the cloud 24/7 without the need for costly hardware or software.

    Provided By Symantec

  • Webcasts // Jan 2012

    Cloud Security Services - Symantec.cloud

    In this webcast, the presenter says everyday businesses are moving across too cloud-based security services for several key reasons including: eliminate the need for hardware or software investment, Fixed cost of ownership, Guaranteed Service Level Agreements, and 24/7 protection.

    Provided By Symantec

  • Webcasts // Jan 2012

    Strong Authentication For Enterprises

    In this webcast, the presenter tells about Symantec. The presenter also explains about Symantec benefits and its SAFE. SAFE stands for Strong Authentication For Enterprises, and it's based on helping one securely enable their business partners and employees access to internal business resources.

    Provided By Symantec

  • Webcasts // Jan 2012

    Preventing Data Loss at ECI Telecom

    Challenged to protect data in motion and at rest, while streamlining monitoring, this global provider of networking infrastructure equipment standardized on Symantec Data Loss Prevention to improve risk posture and produce quicker reporting.

    Provided By Symantec

  • Webcasts // Jan 2012

    DLT Solutions: Security and Availability

    In this webcast, the presenter discusses about the strategic IT issues and their public sector client base face and how the Symantec product portfolio assists them in solving their agencies' business issues.

    Provided By Symantec

  • Webcasts // Jan 2012

    Perkins Eastman Customer Success: Cloud Security Solutions

    In this webcast, the presenter shares his experience about Symantec.cloud solutions. The presenter explains uses of Symantec.cloud solutions and its to capture 99% of spam at the email gateway and keeps its environment virus/malware free.

    Provided By Symantec

  • Webcasts // Jan 2012

    Microsoft & Viewfinity Present: Windows 7 Migration is the Opportunity to Lockdown Desktops & Manage Standard User Privileges

    In this webcast, Microsoft and Viewfinity discuss endpoint security within the context of Windows 7 migrations with a specific emphasis on the protection provided by removing administrator rights. Alex Shteynberg, Technology Architect in the New York City Microsoft Technology Center discusses reasons why the desktop refresh fits perfectly into a...

    Provided By Viewfinity

  • Webcasts // Jan 2012

    How to Improve Your VOIP Sound Quality

    In this Webcast the presenter describes about how to improve their VOIP sound quality. One can get a QoS device installed on their network. One of them is offered by D-link, it's called a DI101. And some firewalls or routers have it incorporated into their device as well so one...

    Provided By Videojug

  • Webcasts // Jan 2012

    Security for VoIP

    In this webcast, the presenter describes about security for VoIP. The presenter also explains about VoIP clipping, VoIP DoS attack, VoIP-related SPIT, caller ID spoofing, VoIP pharming and how viruses used to affect VoIP calls, etc.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Protect a Wireless Connection

    If the user is concerned about hackers tapping into their wireless internet connection, and want to make it as secure as possible, in this Webcast the presenter describing about how to protect a wireless connection.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Choose an Internet Password

    In this Webcast the presenter describes about what is a "password" and how do one can choose that? The presenter also describes that password is that secret code word that one set up, it's an agreement between the user and their host, or email provider, service provider, that this is...

    Provided By Videojug

  • Webcasts // Jan 2012

    How To Make Your Wireless Network Secure

    In this Webcast, the presenter explains about how to make the wireless network as a secured one. While setting up their wireless network one also want to be concerned about security. It's a little bit more vulnerable than a wired network is but it doesn't have to be.

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Tell if a Website Is Secure

    There are a number of ways that the user can tell whether a site that their working with is secure or not. One of the most common ways is a little icon on the bottom of their browser that's a padlock. In this Webcast, the presenter explains about website security.

    Provided By Videojug

  • Webcasts // Jan 2012

    Computer Security and Surfing

    In this Webcast, the presenter explains about computer security and surfing. Encryption is a process in which data is encoded so that it can be sent over lines, network lines, the Internet, and it is decoded on the end where it is received. That way, the information, if it's intercepted...

    Provided By Videojug

  • Webcasts // Jan 2012

    How to Enhance the Privacy of Your E-mail On Your Computer

    E-mail is relatively private. Relatively private because it does involve machines and servers that handle multiple pieces of mail and are administered by other people. In this Webcast, the presenter explains about how to enhance the privacy of their E-mail on their Computer.

    Provided By Videojug

  • Webcasts // Jan 2012

    netmap: A Novel Framework for Fast Packet I/O

    Many applications (routers, traffic monitors, firewalls, etc.) need to send and receive packets at line rate even on very fast links. In this webcast, the presenter presents netmap, a novel framework that enables commodity operating systems to handle the millions of packets per seconds traversing 1..10 Gbit/s links, without requiring...

    Provided By USENIX

  • Webcasts // Jan 2012

    Mikko Hypponen: Three Types of Online Attack

    In this Webcast, the presenter discusses about online attack. The presenter also explains about three types of online attack on the people privacy and data - and only two are considered crimes.

    Provided By TED Conferences

  • Webcasts // Jan 2012

    VMware VNetwork Distributed Switch and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    Cisco Nexus 1000V and VSphere

    In this webcast, the presenter introducing the new features in vSphere 4.0 for virtual networking. This includes the Virtual Network vMotion, virtual network appliances (such as firewalls) and the new vNetwork Distributed Switch. This is a good introduction to some of the new features with vSphere 4.0 virtual networking.

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    VMware Distributed Power Management and VSphere

    This webcast introduces the VMware Distributed Power Management (DPM) and how it can be leveraged to save power and money in the data center. The VMware Engineer discusses how it can be leveraged to improve the efficiencies in the data center and leverage it for power and cost savings. about...

    Provided By Itex Enterprise

  • Webcasts // Jan 2012

    IT Trends to Watch in 2012

    In this webcast, the presenters discuss about IT trends for 2012. The presenters also discuss under the topics of consumerization of IT, where security threats will come from, the rise of big data and the cloud, and the IT economy.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    Google On Stupid vs. Money, SSL Search Firefox & HTML5 SEO

    In this webcast, the presenter explains about Google tools. Firefox is testing defaulting users to SSL Google which can be bad for marketers. Google made a change for some browsers that might label Google search traffic as direct referrer.

    Provided By SPNVideos

  • Webcasts // Jan 2012

    Safe Surfing: Narcissist Invades Your Computer

    In this webcast, the presenter discusses about the suspicious behavior in the internet such as persistent pop-ups; the computer or connection slow down considerably; repeated re-boots; mouse or keyboard freeze; strange messages and alerts. The presenter also discusses the Safe Surfing method to protect the computer from malware.

    Provided By Internet Archive

  • Webcasts // Dec 2011

    Faculty Forum Online: Homeland Security

    National security in an age of massive movements of people across borders is a universal concern that involves complex issues. While borders have different characteristics and challenges, there are areas of commonality. Fortunately, the overwhelming majority of crossings are not problematic, but the ones that are raise concerns.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2011

    Screencast: Private Cloud Storage Optimization (related to Optimizing Storage)

    Learn how optimizations in Oracle Database 11g and Oracle Exadata Efficiently manage more data, maximize performance and provide protection against data loss. Reduce storage costs by a factor of 10x.

    Provided By Oracle

  • Webcasts // Nov 2011

    Google I/O 2010 - Google Storage for Developers

    In this webcast, the presenter explains about Google's expanding storage products by introducing Google Storage for Developers. The presenter also describes the advantage of the performance and reliability of Google's storage infrastructure, as well as the advanced security and sharing capabilities.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Fluid Social Experiences Across Sites

    As more sites add social functionality, profiles, friends, and conversations are becoming increasingly fragmented. But an emerging collection of open technologies aim to help bridge these social islands, allowing users to seamlessly move between sites and have unified conversations that span multiple web sites. In this webcast, learn how OpenID,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Exploring the Google PowerMeter API

    In this webcast, the presenters will discuss interesting ways to make users understand and manage their home energy use through Google PowerMeter. The Google PowerMeter API currently available allows devices to integrate with Google PowerMeter.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - The Open & Social Web

    In this webcast, the presenter will cover the latest and most important trends of the Social Web and dive deep into where this is all going, at both technical and conceptual levels. From the concepts of digital identity, relationships, and social objects. The presenter will also cover emerging technologies like...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - Where Is the Social Web Going Next?

    With the advent of social protocols like OAuth, OpenID and ActivityStrea.ms, it's clear that the web has gone social and is becoming more open. In this webcast, the presenter will discuss the importance of such emerging technologies, how they've adopted them in their products and debate what's next.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - OpenID-Based SSO & OAuth for Google Apps

    In this webcast, the presenter will discuss about the auth tangles that the user have encountered so far - OpenID, SSO, 2-Legged OAuth, 3-Legged OAuth, and Hybrid OAuth. The presenter will show the user when and where to use the APIs, code some example apps, and demonstrate how they all...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Google I/O 2010 - What's the Hubbub About Google Buzz APIs?

    Google Buzz is a new way to share updates, photos, videos and more, and start conversations about the things the user find interesting. In this webcast, the presenters will take a deep dive into building with the Buzz APIs and the open standards it uses, such as ActivityStrea.ms, PubSubHubbub, OAuth,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Aug 2009

    Secure Coding

    It is a frequent yet unintended mistake among software developers. In copying a string in memory, they unwittingly create a vulnerability that can be used to execute malicious code by an attacker. The malicious code may be used to spread a worm, or insert a back door on a machine,...

    Provided By Carnegie Mellon University

  • Webcasts // May 2009

    SQUARE Up Your Security Requirements Engineering with SQUARE

    It is well recognized in industry that requirements engineering is critical to the success of any major development project. Security requirements, if they are specified at all, tend to be developed independently of the rest of the requirements engineering activity.

    Provided By Carnegie Mellon University

  • Webcasts // Sep 2009

    Securing IP Networks

    As Fixed Mobile Convergence (FMC) is opening the door to a wealth of new opportunities for service providers and their customers, it also ushers in a number of potential security flaws that can be exploited. These security concerns are compounded by the fact that IP and open source technologies are...

    Provided By Light Reading

  • Webcasts // Jul 2009

    When Reputation Is No Longer Enough

    The number of compromised, legitimate Web sites has recently surpassed the number of sites created by attackers. Attendee of this webcast will learn how to protect the business against these insidious threats.

    Provided By Websense

  • Webcasts // Jan 2009

    Protecting Your Data With Forrester Research and Websense

    The attendee will learn about the insider threat to information security, including recommendations on how to safeguard the corporate assets with information leak prevention technology.

    Provided By Websense

  • Webcasts // Jun 2011

    African Elections And Democracy

    Nations across Africa are holding elections, a good sign for emerging democracies on the continent. However, the presenter says the quality of governance in African nations varies widely. Some states are making solid progress toward becoming effective democracies, while others remain under the sway of corrupt leaders, with serious consequences...

    Provided By Brookings Institution

  • Webcasts // Apr 2011

    Redistricting For Political Gains

    Every decade since 1790, a census of the entire U.S. population is used by state governments to apportion representatives in the U.S. House of Representatives. But the redrawing of congressional districts that follows the census is an exercise in pure politics, says the presenter.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Politics And Process Of Congressional Redistricting

    Now that the 2010 Census is concluded, states will begin the process of reapportionment - re-drawing voting district lines to account for population shifts. A Nonresident Senior Fellow, the presenter, says redistricting has been fraught with controversy and corruption since the nation's early days, when the first "Gerrymandered" district was...

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The History Of The State Of The Union

    Presidential scholar and former White House speech writer the presenter has seen many presidents deliver the State of the Union message, and studied its evolution over the past two centuries. As Washington prepares for President Obama's second such address, the senior fellow emeritus discusses the history of the speech.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Government And Internet Security

    The Internet has expanded communications and commerce in ways unimaginable just a few years ago. But there is a downside: personal information, business records and government materials aren't always secure from hackers and thieves. Venturing into cyberspace isn't completely safe, as Nonresident Fellow the presenter explains.

    Provided By Brookings Institution

  • Webcasts // Dec 2010

    Obama~s Nominees To Federal Judgeships Lag

    The pace of confirmations to the federal bench has slowed in recent years, and President Obama's nominees to the federal district courts and appeals courts have faced considerable partisan resistance. Visiting Fellow the presenter says historically, well-qualified presidential nominees were routinely confirmed to the bench, but that's no longer the...

    Provided By Brookings Institution

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Apr 2009

    The Illegal Drug Trade; Obamas Trip To Turkey; And Cuba

    In this webcast, Latin America Initiative Director, one of the presenters and a panel of experts discuss a new report on the illegal drug trade and organized crime in Latin America; Governance Studies Vice President and Director, the other presenter, takes at look at President Obama's meeting with leaders from...

    Provided By Brookings Institution

  • Webcasts // Mar 2009

    Janet Napolitano On Homeland Security; Jim Steinberg On Foreign Policy; Credit Card Gouging

    In this webcast, a U.S. Homeland Security Secretary, one of the presenters, talks homeland security issues along our northern border; Deputy Secretary of State, the other presenter addresses the foreign policy challenges facing the fledgling Obama administration; and the man of the street sounds off on credit card gouging.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    Partisanship On Capitol Hill

    Brookings takes an in-depth look at the polarizing effects of partisanship on Capitol Hill. Senior Fellow assesses the situation and offers some insight into how this way of doing business will affect the midterm elections.

    Provided By Brookings Institution

  • Webcasts // Feb 2010

    Education And President Obamas Budget

    When President Obama's proposed budget was released, education was declared among the "Winners." In this webcast, the presenter says the proposed spending increases will make reform advocates smile, but could leave state legislators cold about the shift from state to federal funding.

    Provided By Brookings Institution

  • Webcasts // Oct 2009

    Closing Schools For H1N1 Flu; Children At Risk Of Abuse; Iran

    Brookings expert says closing schools to keep kids safe from the flu may come with a big price tag for the economy; scholars and a member of Congress debate the efficacy of home visitation for children at risk of abuse and neglect; and the man on the street discusses nuclear...

    Provided By Brookings Institution

  • Webcasts // May 2010

    The Senate Filibuster

    The founding fathers viewed the Senate as a place where heated rhetoric could cool down, but today the upper chamber is just as fiercely partisan as the House. The presenter describes the origins of the filibuster and why the idea of allowing one Senator to block Senate business has its...

    Provided By Brookings Institution

  • Webcasts // Jan 2010

    PLD: How Will Organizations Benefit?

    When leaders in a single domain gain a broader business foundation, valuable contributions follow.

    Provided By President and Fellows of Harvard College

  • Webcasts // Jan 2009

    Five Ways to Reduce Your IT Audit Burden

    Most organizations spend 30-50% more on compliance than they should. The good news is that compliance can be achieved effectively and efficiently and the attendee of this webcast will learn five key methods to streamline the compliance efforts and reduce the IT audit burden.

    Provided By CXO Media

  • Webcasts // Jan 2009

    Protecting PII: How to Work With IT to Manage Risk

    Privacy professionals must make sure their IT organization is employing responsible privacy practices that will ensure the safety of their company's business-critical data or face significant fines. Understand the critical nature of the test data privacy problem and tips on how to work with IT to implement a test data...

    Provided By CXO Media

  • Webcasts // Jan 2009

    Barracuda Spam & Virus Firewall Introduction

    This webcast will give introduction of Barracuda spam & virus firewall.

    Provided By Barracuda Networks

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva