Search Results for: security_overview

Video: Amazon Web Services API Security Overview
Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.

Intel

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

Red Hat

Reducing Security Complexity
In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

Optus Business

Intel® Xeon® E7-8800/4800/2800 Product Families Features & Benefits
This animated module, the first of four, includes and overview on the benefits of one product family and highlights performance, scalability and reliability.

Dell, Inc. and Intel®

Welcome to Iron Mountain’s National Data Center
This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.

Iron Mountain

LogRhythm 3-Minute Product Demo
This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

LogRhythm, Inc.

Basic Building Blocks: Preparing for PCI DSS 2.0
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

Veracode, Inc.

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.

Klocwork

Windows Azure Platform Security Essentials for Technical Decision Makers
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform.

Microsoft

Course: Improper Validation of Array Index (CWE-129)
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

Klocwork