Search Results for: security

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats (Forrester)
This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

LogRhythm, Inc.

IBM Intelligent Investigation Manager
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.

IBM

Expect More From Your SIEM
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.

AT&T Cybersecurity

McAfee ePO Deep Command - Unlocking the Value of Intel vPro
In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

Intel and McAfee

New Reality of Stealth Crimeware Video
An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

Intel

Symantec Endpoint Protection 12 Trialware
Access this trial software by Symantec and discover the benefits of effective endpoint security.

Symantec Corporation

Enhancing Security with Intel® Trusted Execution Technology
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

Dell, Inc. and Intel®

Bring Your Own Security to the Cloud
Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

CenterBeam

Protecting_your_Critical_Information_and_Employees
This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

Clearswift

2013 Cost of Cyber Crime – UK, France and Germany Findings
Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.

Hewlett-Packard Enterprise