Search Results for: security

HP Mobile Application Security
Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

Hewlett Packard Enterprise

The Custom Defense - Your Answer to APTs
Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

Trend Micro

Cloud Security: Enterprise Point of View
Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

Dimension Data

Symantec IM Manager
Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.

Symantec Corporation

Mobile Application Security from HP - Build security into your mobile applications
Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.

Hewlett-Packard Enterprise

A college board case study: quality software is secure software
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.

IBM

Six Steps to SIEM Success
In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

AT&T Cybersecurity

The Payment Island Deconstructed
This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

FireHost Inc.

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins
This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.

Intel

Mobile Security: Containerizing Enterprise Data
Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.

Code42