Search Results for: security

Expect More From Your SIEM
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.

AT&T Cybersecurity

McAfee ePO Deep Command - Unlocking the Value of Intel vPro
In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

Intel and McAfee

New Reality of Stealth Crimeware Video
An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

Intel

Security by Design: How AEC is Embedding Security into Building Design
With most security discourse is concerned with defending your business-critical data and other digital infrastructure, it can be easy to lose sight of where your organization is most vulnerable; It’s physical location. Watch the webcast to learn why security needs to be calculated into the foundation of building design.

TOPICS: .NET
Brivo

Symantec Endpoint Protection 12 Trialware
Access this trial software by Symantec and discover the benefits of effective endpoint security.

Symantec Corporation

Enhancing Security with Intel® Trusted Execution Technology
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

Dell, Inc. and Intel®

Protecting_your_Critical_Information_and_Employees
This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

Clearswift

Bring Your Own Security to the Cloud
Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

CenterBeam

2013 Cost of Cyber Crime – UK, France and Germany Findings
Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.

Hewlett-Packard Enterprise

Enhancing Server and Cloud Security with Intel® Trusted Execution Technology (Intel® TXT)
This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments.

Dell, Inc. and Intel®