Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Choosing Cyber Resilience Also Means Choosing a Better Data Protection

    Videos · Sep 2021 · Provided By Rubrik

    Organizations and security product vendors have been focusing on the wrong "disasters" for decades. There needs to be more focus on cyber resilience, especially in the area of data protection. Rubrik, as a supplier of products and services around backup and recovery, is continuously working on the topic of cyber...

    Watch Now
  • Autodesk Scales Cloud Security with Ease

    Videos · Sep 2021 · Provided By FORTINET

    Autodesk is a leading provider in design and software for a wide variety of industries. They focus on giving companies and individuals the power to work more quickly, effectively, and sustainably throughout the entire project lifecycle. From the perspective of its networking teams, that vision translates into a bold...

    Watch Now
  • Advanced security capabilities to expand your SASE threat protection

    Videos · Jun 2021 · Provided By Cisco Umbrella

    Cisco Umbrella integrates multiple security functions that were once standalone security into a single, cloud-native service. Having an all-in-one service significantly simplifies security and reduces the cost, time, and resources previously required for deployment, configuration, and integration. It unifies secure web gateway, cloud access security broker, DNS-layer security, cloud-delivered firewall,...

    Watch Now
  • Optimizing your path to modern SIEM - Video - UKI

    Videos · Apr 2021 · Provided By IBM

    There’s no discounting the importance of having a security information and event management (SIEM) strategy. The question is now this: what if you could take a more proactive, automated, and holistic SIEM approach that drives security everywhere in your enterprise today and tomorrow – and contributes to a smarter, safer...

    Watch Now
  • Optimizing your path to modern SIEM

    Videos · Apr 2021 · Provided By IBM

    There’s no discounting the importance of having a security information and event management (SIEM) strategy. The question is now this: what if you could take a more proactive, automated and holistic SIEM approach that drives security everywhere in your enterprise today and tomorrow – and contributes to a smarter, safer...

    Watch Now
  • Optimizing your path to modern SIEM - Video

    Videos · Apr 2021 · Provided By IBM

    There’s no discounting the importance of having a security information and event management (SIEM) strategy. The question is now this: what if you could take a more proactive, automated, and holistic SIEM approach that drives security everywhere in your enterprise today and tomorrow – and contributes to a smarter, safer...

    Watch Now
  • Shift Identity Left - Enable Secure Velocity at Scale Webinar

    Videos · Mar 2021 · Provided By Okta

    This talk will cover best practices for securing automated DevOps pipelines, and the key role identity plays to ensure the right guard rails are in place. With a modern approach to identity, security is no longer an afterthought, but rather part of the process, enabling velocity at scale without compromising...

    Watch Now
  • Keeping Remote Work Safe with SaaS

    Videos · Mar 2021 · Provided By Commvault & MFST

    Watch this video to learn how SaaS can keep your data safe in the cloud.

    Watch Now
  • Getting Started with SASE On-demand Webinar

    Videos · Sep 2020 · Provided By Akamai Technologies

    A conversation about SASE and network security frameworks In this on-demand webinar, Akamai CTO Patrick Sullivan and former Gartner Analyst, now Akamai Director of Security Strategy, Siddharth Deshpande discuss secure access service edge (SASE). This cybersecurity model merges the functions of network and security point solutions into a unified,...

    Watch Now
  • 5 Steps to Integrate SAST Into the DevSecOps Pipeline

    Videos · Sep 2020 · Provided By Synopsys

    Why do we need static analysis? To uncover potential violations of coding standards To evaluate the efficacy of security controls and coding constructs that have been implemented to satisfy specific security requirements To provide a way for developers to learn about and remediate security defects To review code for...

    Watch Now