Search Results for: security

Anatomy of a Database Attack
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

Imperva

Prevention Is Your First Line of Defense from Ransomware. But What If Prevention Fails? (VIDEO)
Prevention is Your First Line of Defense From Ransomware. But What if Prevention Fails?

StorageCraft Technology Corporation

Core IMPACT Essential
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

Core Security Technologies

Video: Amazon Web Services API Security Overview
Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.

Intel

Maximum-Strength Threat Detection for Mid-Size Enterprises
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.

EMC Corporation

Tips for Expediting Incident Response
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.

Threat Track Security

Webinar: 20 Critical Controls for Cyber Defense
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

ISACA

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.

Lumension

VMware vShield: Secure your Cloud with Virtualization-aware Security
Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost.  Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.

VMware, Inc.

A free Demonstration of Panda Cloud Systems Management
Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

Panda Security