Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2014

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    PCIDSS and Secure Applications

    The Payment Card Industry Data Security Standard (PCI DSS) applies to whether cardholder data is stored, processed or transmitted. In this webcast, the presenter will examine the best practices in development of bespoke or custom written applications to be used within the cardholder data environment of the PCI DSS to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud-Based Detection Techniques for Botnets and Other Malware

    Traditional techniques for detecting malware, such as viruses, worms and rootkits, rely on identifying virus-specific signature definitions within network traffic, applications or memory. Botnets are ideally suited for launching mass Distributed Denial of Services (DDoS) attacks against the ever increasing number of networked devices that are starting to form the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to New Stream Cipher Designs

    Even with \"Nothing to hide\", the user want to protect the privacy of their bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, BitTorrent, SSL), A5/1 (GSM telephony), E0 (Bluetooth), as...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Rich Internet Applications

    In this webcast, the presenter will examine the largely under researched topic of Rich Internet Applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Methods for Understanding Targeted Attacks with Office Documents

    In this webcast, the presenter will give an overview about the office file format. The presenter also explains the in-depth technical details and practical analytical techniques for triaging and understanding these attacks, defensive mechanisms to reduce the effectiveness of the attacks, forensics evidence that can help trace the attacks, static...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Failures in Smart Card Payment Systems

    PIN Entry Devices (PEDs) are used in the Chip & PIN (EMV) system to process customers' card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking the iPhone

    Apple's iPhone has made a tremendous impact on the Smartphone market and the public consciousness, but it has also highlighted their desire to carefully control the device with draconian restrictions. These restrictions prevent users from choosing to run third-party applications unauthorized by Apple and using the devices on carriers not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security and Anonymity Vulnerabilities in Tor

    There have been a number of exciting bugs and design flaws in Tor over the years, with effects ranging from complete anonymity compromise to remote code execution. Further, the academic research community has been coming up with increasingly esoteric and increasingly effective, attacks against all anonymity designs, including Tor.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    SWF and the Malware Tragedy

    In this webcast, the presenter explains possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF. While there are some tools out there to analyze AS2 and AS3 based SWF, using various techniques, analysis of SWF can become a nightmare.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    How Safe Is Our Data on Computers?

    How safe is the users' data on computers? The movement the users connect to any network the data becomes unsafe. In this webcast the presenter going to explain about the data safety in computer.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2014

    Protect Against Email Targeted Attacks with Symantec Disarm Technology

    In this webcast, the presenter going to explain about the how to protect against email targeted attacks. The presenter will also explain how targeted attacks work and how Symantec email security solutions, including the new Disarm technology, can help protect the users' company from them.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Enterprise Vault Exchange 2013 OWA Support Part: 2 (User Actions)

    Enterprise Vault 10.0.3 introduces support for Archive access. In this webcast, the presenter introduces the various user actions that end-users have come to expect from Enterprise Vault, including archiving, restoring and deletin.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    UZ Leuven Secures Virtual Infrastructure with Symantec

    A best-in-class integrated Symantec endpoint security solution is helping this leading Belgian healthcare provider to adopt a proactive approach to security, lower costs through virtualization, and drive even higher levels of availability.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    PGi Improves Risk Posture, Protects Against Threats with Symantec Solutions

    PGi needed to protect its diverse, heterogeneous environment of 2,000 endpoints. To accomplish this, PGi turned to Symantec security solutions. Key benefits included improved risk posture and protection of its valuable customer data.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Protect your Domain Controllers with Symantec Critical System Protection

    How do the users' secure their Active Directory (AD) environment, specifically the domain controllers that are the gatekeepers of their organization's critical data? In this webcast find out how Symantec critical system protection can help.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    Address PCI Requirements with Symantec Critical System Protection

    Now-a-day's one of the biggest challenges are addressing the PCI requirements. In this the webcast the users' will learn how they can protect valuable cardholder data and meet PCI DSS compliance with Symantec Critical System Protection.

    Provided By SYMA S.C.

  • Webcasts // Jan 2014

    TBS Internet: Securing EMEA with Symantec SSL

    In this webcast, the presenter discusses the value of Symantec's Website Security Solutions. The presenter also explains how they enable their customers to feel their data and online transactions are secure.

    Provided By SYMA S.C.

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Oct 2013

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Oct 2013

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Oct 2013

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Oct 2013

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • Webcasts // Oct 2009

    Simplify, Automate, and Reduce the Cost of IT Asset Disposal With TechTurn's Retirement Solution

    The attendee of this webcast will learn about a new free plug-in for the Symantec Management Console called TechTurn Retirement Solution. TechTurn Retirement Solution extends the power of the Altiris management software by automating the often ignored "Last mile" in an asset's life. Now one can use the Symantec Management...

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • Webcasts // Nov 2009

    Get the Most Return From Your Backup Exec Investment

    Anyone on an older version of Backup Exec may be missing out on valuable backup and recovery advantages achieved by simply upgrading. Recent internal performance testing proves that by simply upgrading to the latest version of Backup Exec 12.5, one can experience a 50-100% increase in backup performance. Symantec Backup...

    Provided By Symantec

  • Webcasts // Nov 2009

    Mind the Gap: What 3rd Party Archiving Brings to Your Exchange Environment

    There are a lot of messages, storage, backups, policies, and people to manage just to maintain the current state of email and make sure it's accessible to those who need it, when they need it. Many organizations need more than the archiving functionality that will be available within Exchange 2010....

    Provided By Symantec

  • Webcasts // Nov 2009

    Windows Virtualization - Crossing the Data Protection Divide With NetBackup

    As more companies move to virtualization to control spiraling IT costs, virtual machines are taking on more mission-critical workloads as Microsoft Exchange, SQL, SharePoint, and Active Directory. Protecting such application, data, and storage-intensive environments takes on a whole new set of complexities, and typically requires a whole new set of...

    Provided By Symantec

  • Webcasts // Oct 2009

    Why Breaches Happen... and What to Do About It

    For companies with critical information assets such as customer data, intellectual property and proprietary corporate data, the risk of a data breach is now higher than ever before. In order to reduce this risk, it is essential to understand why and how data breaches occur. The attendee of this webcast...

    Provided By Symantec

  • Webcasts // Oct 2009

    Announcing the Backup Exec 2010 Early Adopter Program - Dedupe Everywhere!

    Interested in learning more about the benefits of data deduplication? The next major release of Backup Exec coming later this year brings industry recognized deduplication technology (using NetBackup PureDisk technology). The attendee of this webcast will learn how to enroll in the upcoming early adopter program and the data reduction...

    Provided By Symantec

  • Webcasts // Jun 2009

    Backup Is for Recovery, Archiving Is for Discovery: Legal and IT Considerations of Each

    The presenters of this webcast discuss the changing role of backup technology in the enterprise. The presenters discuss four key elements of backup and archiving: Backup is for Recovery, Archiving is for Discovery, Accessible or Inaccessible, Backup and Archive Retention Policies and Archiving and Backup.

    Provided By Symantec

  • Webcasts // May 2009

    Data Protection and Compliance: Improve Security, Manage Risk & Lower Costs

    Information has become the single most important asset to an organization's success, whether it's customer information, confidential corporate information, or financial information. Ensuring that information assets remain secure and readily available to remote employees, customers, and partners is critical to a high performance organization. The attendee will gain an understanding...

    Provided By Symantec

  • Webcasts // May 2009

    Backup and Recover Your Microsoft Hyper-V Environment in Seconds

    Planning to implement Microsoft Hyper-V to help reduce IT costs and improve scalability? There are many IT benefits to vitalizing a server environment and also several infrastructure changes that must be addressed. One change must consider is how to implement a reliable backup and recovery solution to protect critical data...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • Webcasts // Jun 2009

    Faster Recovery With Symantec: Comparative Testing of Data Protection Solutions

    The presenter of this webcast will provide an overview of the test processes, highlight key findings about current solutions in the marketplace, and relate why they are important to any business running Microsoft Exchange and/or VMware environments. The attendee will learn the challenges of protecting Exchange environments, alternatives to protecting...

    Provided By Symantec

  • Webcasts // Aug 2009

    Achieve "Proactive Compliance" Through Automation

    The presenter of this webcast examines how the organization can achieve "Proactive compliance" by standardizing on IT controls and automating the compliance process. Leveraging a Capability Maturity Model as a framework, the presenter will discuss solutions which can be deployed to help to reach this goal. The presenter will also...

    Provided By Symantec

  • Webcasts // Aug 2009

    Expand Your Data Recovery Capabilities With Complete System Protection

    Organizations around the world trust market leading Symantec Backup Exec technology to protect business critical applications and data, but how to backup and recover entire servers or desktops in the event of a failure or disaster? The attendee of this webcast will discover how Backup Exec System Recovery complements and...

    Provided By Symantec

  • Webcasts // Jul 2009

    Using Best Practices to Comply With NERC Cyber Security Compliance

    Electric power companies face increasing regulatory requirements, including NERC CIP, Sarbanes Oxley and others. To maintain these regulations can be costly and time-consuming. Moreover, 2009 is a critical year for energy and utility companies as The North American Electric Reliability Corporation (NERC) regulations require that utilities be "compliant" by July...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure and Manage the Endpoint With Altiris Client Management Suite

    90% of incidents would not have happened if the endpoints simple had the appropriate patch installed? Good systems management is key to protecting the systems from vulnerabilities. The attendee will learn how to configure and protect the endpoint using Altiris Client Management Suite. This industry-leading product will help as an...

    Provided By Symantec

  • Webcasts // Jul 2009

    Secure Information and Manage Endpoints With 24x7 Monitoring and Management

    Due to the growing threats and the challenge presented by limited resources, there is an increasing desire to partner with a service provider for the deployment and management of endpoint protection solutions. In fact, a recent Managed Security in the Enterprise report stated a majority (61 percent) of those surveyed...

    Provided By Symantec

  • Webcasts // Jul 2009

    Faster Recovery With Symantec: Comparative Testing Between Symantec Data Protection Solutions and EMC NetWorker

    This webcast will present the key findings from comparative testing of Symantec Data Protection solutions, Backup Exec and NetBackup versus EMC NetWorker, which was sponsored by Symantec. This Webcast will provide detailed insight into the findings and relate why they are important to any business running Exchange and/or VMware environments....

    Provided By Symantec

  • Webcasts // Jul 2009

    Security and Backup 101 - Best Practices

    The attendee will learn about the "101" basics and best practices of protecting the business information. The presenter will explore why backup and security are important to the business, as well as what are some effective business practices for protecting the critical information and how can one implement them into...

    Provided By Symantec

  • Webcasts // Jul 2009

    NetBackup 6.5.4 - What's New

    The presenter of this webcast gives quick overview of key features in the latest release of Symantec's leading data protection solution, Veritas NetBackup 6.5.4. The attendee will learn how this newest release continues to expand Symantec's protection capabilities for virtual platforms and Microsoft environments, as well as offering greater manageability...

    Provided By Symantec

  • Webcasts // May 2009

    Competitive Analysis of Performance Impact of Endpoint Security Solutions for Small Businesses

    In small businesses with limited budgets for hardware upgrades, it is important that security software does not significantly impact computer performance. The presenter of this webcast gives the findings of a comprehensive performance comparison which includes 7 vendors, 44 test scenarios, and over 2000 individual test runs. The test concentrated...

    Provided By Symantec

  • Webcasts // May 2009

    Maximize Your Data Protection Infrastructure

    The attendee of this webcast will get a better understanding on how to maximize the NetBackup data protection infrastructure. Building a robust infrastructure begins with the right architecture and this webcast will provide guidance on this design process and the most important areas of consideration.

    Provided By Symantec

  • Webcasts // May 2009

    What's New in Backup Reporter 6.6: Now With Archive Reporting and Even More Enhanced Backup Reporting

    Backup Reporter 6.6 new features and enhancements will be showcased. The premier new feature is that it is now capable of reporting on Symantec's industry leading archiving solution, Enterprise Vault. The same business-level trending and analysis can be applied to archive reporting as well as its already superb backup reporting....

    Provided By Symantec

  • Webcasts // May 2009

    From Endpoint to Gateway: Effectively Secure Your Environment With the New Symantec Protection Suite Enterprise Edition

    How compete is the environment protected from today's complex malware, data loss, and spam threats? In the event of user error, hardware failure, or malicious action can one rapidly recover desktops and laptops so the users can remain productive? The presenter of this webcast discuss Symantec's newest security suite, Symantec...

    Provided By Symantec

  • Webcasts // May 2013

    On-demand Webcast - Next Generation Backup and Archive in a Cloud-Centric World

    Companies are generating more data than ever before, keeping it for longer periods of time, and using new ways to transform it into business value. This is putting more pressure on IT managers to rethink their data management approaches, especially Backup and Archive. CBS Interactive is proud to present...

    Provided By Quantum

  • Webcasts // May 2009

    Webcast: Top Tips To Keep Data Under Your Control

    You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task. Hosted by Moderator James Hilliard and featuring Compliance and Security...

    Provided By Sophos

  • Webcasts // Nov 2010

    CA & Red Hat Present: Who's Securing Your JBoss Applications?

    Single-sign on, strong user authentication, and centralized security policy management are keys to securing any mission critical infrastructure. After this webcast, the will, gain a better understanding of how CA and Red Hat collaborate together Learn how and why customers use identity and access management tools in their mission critical...

    Provided By Red Hat

  • Webcasts // Jan 2010

    TechNet Radio Security Talk: Advocating Privacy and Making the Case for Data Governance

    The attendee of this webcast will listen to the presenter as they discuss the importance of Data Privacy and Protection and how Microsoft can help keep the sensitive information safe.

    Provided By Microsoft

  • Webcasts // Feb 2010

    Identity and Access Management Solution

    The presenter describes the capabilities and business drivers behind the solution. The presenter gives demo of parts of the solution. The demo includes automated AD group management and access through Forefront Identity Manager (FIM), FIM password reset, and managing group membership via Outlook.

    Provided By Microsoft

  • Webcasts // Feb 2010

    Forefront Threat Management Gateway Web Access Protection

    This webcast describes how Forefront Threat Management Gateway is a web access protection solution. This webcast dives into HTTPS inspection: privacy concerns, how it works.

    Provided By Microsoft

  • Webcasts // May 2010

    Securing Sensitive Information - How MSIT Uses ADRMS + RSA DLP

    The presenter gives an overview of how Microsoft IT secures sensitive information across the vast Microsoft network. The presenter discusses the basics of how RSA DLP, Microsoft AD RMS and other Microsoft Forefront technologies work together to protect and secure HBI Data.

    Provided By Microsoft