Search Results for: security

How is IoT security evolving?
Yes, IoT devices present innovative opportunities. Yet, given that many of those devices lack built-in security controls, IoT devices also present security risks. For a deep dive on the state of IoT security, check out this webcast featuring three leaders from Portnox.

TOPICS: .NET
Portnox

Web Security – Virtual Appliance
Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

Cisco Systems, Inc.

A free Demonstration of Panda Cloud Systems Management
Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

Panda Security

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

Trend Micro

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

Symantec Corporation

What Is the Future of Endpoint Security?
What is the future of endpoint security? To answer that question, Hector Hernandez, Solution Architect at Logicalis, interviewed a subject-matter expert from IBM in this episode of the “Tech ChangeMakers Podcast.” Tune in to access the insightful conversation.

TOPICS: .NET
TD Synnex

Musings on the PSN Attack Vector
Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

Veracode, Inc.

Spector 360 from SpectorSoft
Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!

SpectorSoft

Symantec Protection Suite Challenge
Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

Symantec Corporation

Symantec Protection Suite Enterprise Edition
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

Symantec Corporation