Search Results for: security

Lowering Risk by Applying Consistent Security Across All of Your Locations
Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

Juniper Networks, Inc.

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection
In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts.

IBM

How Application Whitelisting Can Increase Your Desktop Security
In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.

Faronics

Understanding Secure Work Space for iOS and Android Devices
This exclusive webcast examines how you can establish and maintain a secure workspace for mobile platforms such as Android and iOS.

BlackBerry

Lumension Endpoint Security: Device Control and Application Control
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

Lumension

ISACA PCI Compliance Symposium
As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

Intel

How is IoT security evolving?
Yes, IoT devices present innovative opportunities. Yet, given that many of those devices lack built-in security controls, IoT devices also present security risks. For a deep dive on the state of IoT security, check out this webcast featuring three leaders from Portnox.

TOPICS: .NET
Portnox

How to Limit the Risk of Attack on your XP Assets
This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

AT&T Cybersecurity

What Is the Future of Endpoint Security?
What is the future of endpoint security? To answer that question, Hector Hernandez, Solution Architect at Logicalis, interviewed a subject-matter expert from IBM in this episode of the “Tech ChangeMakers Podcast.” Tune in to access the insightful conversation.

TOPICS: .NET
TD Synnex

Economic & Productivity Impact of IT Security on Healthcare - Video
View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

Imprivata