Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • How Criminals are Playing the Gaming Industry And What You Can Do About It

    Videos · Jul 2020 · Provided By Akamai

    View On-Demand Webinar Now Online security threats are more pervasive than ever, and games have become a primary target for attackers. And why wouldn’t they be? These days, there’s real money to be stolen in the virtual world of gaming. Hackers reportedly stole 218 million personal player records from...

    Watch Now
  • 5-min demo: Data Security

    Videos · Jun 2020 · Provided By Veeam

    Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at...

    Watch Now
  • Address Multi-Cloud Misconfiguration Risks

    Videos · Jun 2020 · Provided By Trend Micro

    Majority of enterprises in Europe are already using Cloud in one form or another. The footprint is currently at 90% and it is growing. So, what is going on and where will we be in less than five years’ time? These and more questions are answered in this webinar on...

    Watch Now
  • Splunk Remote Work Insights On-Demand Webinar

    Videos · May 2020 · Provided By Splunk

    The current global situation has accelerated change, many of Splunk's customers around the world are rapidly shifting most or all of their employees to working remotely during the COVID-19 pandemic. This new remote world brings new challenges. How do you support workforce productivity? How can we ensure their WFH environments...

    Watch Now
  • Magecart Attack Live Demo

    Videos · May 2020 · Provided By PerimeterX

    Watch a Magecart Attack in Action! And Get Practical Tips on How to Protect Your Website. The recent string of Magecart, digital skimming and other client-side attacks have left businesses exposed to data theft, compliance penalties and brand damage. But how do these attacks actually happen? In this...

    Watch Now
  • Case Study Build.com

    Videos · May 2020 · Provided By PerimeterX

    How Leading E-commerce companies Protect Against Advanced Bot Attacks Build.com, an online home improvement site, discussed the challenges of maintaining a fast, reliable, and secure site for their customers. Recently, Build.com saw an increase in Account Takeover Attacks on their login pages. This attack was particularly sophisticated - had...

    Watch Now
  • What Is It Really Like When Your IT Vendor Is Acquired Or Their Products EOL

    Videos · May 2020 · Provided By Gigamon

    Watching this webinar you will have an insight on what you need to think about when products reach there end of life. Products have a natural life cycle, things are deigned to last for a certain period of time. Gigamon go through solutions and how to make the most of...

    Watch Now
  • NetOps 2.0: Application Intelligence

    Videos · May 2020 · Provided By Gigamon

    Watching this webinar from Gigamon will give you an insight on what Application Intelligence is within NetOps 2.0. The topics that will be covered in this webinar are: What is NetOps 2.0? Time in dramatic change in the network How network visibility ensures resilience & security ...

    Watch Now
  • Securing Healthcare With Limited Time And Resources

    Videos · May 2020 · Provided By Gigamon

    Gigamon's out look on healthcare and how it can be improved through a fabric that allows you to access all your information in your network. This tool can help you keep track of information and data, also keeps you safe with security software called threat insight which lets you detect...

    Watch Now
  • Running Securely Among Disruption

    Videos · Apr 2020 · Provided By ConnectWise

    It seems like IT is always finding more needed security solutions to create a layered defense against external and insider threats, malware attacks, ransomware, and the like. Some of the solutions you find are pretty cool and actually get you excited about the prospect of having it running in your...

    Watch Now