Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • SIEM Intel IT’s Security Business Intelligence Architecture

    Videos // Feb 2016 // provided by Intel Security

    Gain Insight on SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

    Watch Now
  • Dell Fireside Chat Part 2: Immobility The Biggest Threat To Productivity

    Videos // Jan 2016 // provided by Dell and Windows 10

    As employees become dispersed and less likely to be found sitting at a desk, between 9 to 5:30, the ability to work remotely is becoming the better go to strategy for organisations. However employees are turning to BYO devices and rather than implementing an effective mobile strategy, some organisations are ...

    Watch Now
  • Dell Fireside Chat Part 3: Get On Board The Mobility Train

    Videos // Jan 2016 // provided by Dell and Windows 10

    Shaping a mobile strategy to future-ready the workforce is key to becoming an agile organisation. However the IT department can't be alone in shaping and enforcing a mobile strategy. Organisations need to look within themselves and each department to get input on creating a comprehensive strategy that will take ...

    Watch Now
  • How to Protect Our Digital World from Cyber Attacks

    Videos // Nov 2015 // provided by IBM Security Intelligence

    A security officer has to be right all the time, the hacker has to be right once. Cybercriminals continuously target financial institutions, enterprises, eCommerce sites and other organizations to steal money and valuable business information. Trusteer, a leading provider of endpoint and clientless cybercrime prevention solutions, now joins IBM ...

    Watch Now
  • 2015 Application Usage & Threat Report

    Videos // Nov 2015 // provided by Palo Alto

    "Unit 42, the Palo Alto Networks threat intelligence team, recently released its annual Application Usage and Threat Report (AUTR), presenting an in-depth analysis of the security implications of software application usage across organizations. They identified explosive growth in the use of unauthorized, cloud-based (SaaS) applications, potentially introducing new security risks ...

    Watch Now
  • Lightboard Series: Securing Amazon Web Services Deployments

    Videos // Nov 2015 // provided by Palo Alto

    This lightboard session takes a look at how next-generation firewall for AWS allows you to identify and control your public cloud-based applications, and protect them from known and unknown threats.

    Watch Now
  • Safeguard Your Data, Productivity and Reputation

    Videos // Oct 2015 // provided by IBM

    Learn how IBM can help you proactively safeguard your data, productivity, and reputation.

    Watch Now
  • 2015 - Already the New Year of the Breach?

    Videos // Jul 2015 // provided by Centrify

    2014 has been referred to in the media as “the year of the breach” with millions of credentials, credit cards, and corporate information stolen. How will 2015 be different? What can you do to prevent your business from becoming the next headline? Since users and data are officially “everywhere” — ...

    Watch Now
  • Turning the Tables on Cyber-Attacks

    Videos // Mar 2015 // provided by Intel Security

    Welcome to the future of Endpoint Protection. If you work on the front lines of IT security, you know that you have seconds to prevent an advanced cyber-attack. Watch this short on-demand webcast and learn how a new technology is really turning the tables on cyber-attacks.

    Watch Now
  • Cyber Resilient Blueprint - Videos

    Videos // Mar 2015 // provided by Symantec

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?