Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Multimedia (View All Report Types)
26 - 50 of 149 Matches Previous Page  |  Next Page
Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Secure Your High-Value Assets in Half the Time
sponsored by Illumio
WEBCAST: This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Pain-Free Secure App Migration
sponsored by Illumio
WEBCAST: This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

How to Protect Our Digital World from Cyber Attacks
sponsored by IBM
VIDEO: Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.
Posted: 13 Jun 2016 | Premiered: 14 May 2014

IBM

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

Check Point Software Technologies Ltd.

Masergy Customer turned Evangelist, Stuart Carrothers talks Masergy
sponsored by MASERGY
WEBCAST: In this video, you'll discover a security vendor that wants to work with you for the lifetime of your organizations. From them, you'll get real-time visibility and change bandwidth as you need it. Learn about largest global network in the world based on software defined networking.
Posted: 07 Jun 2016 | Premiered: May 1, 2016

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Hulu Solves Their Security Analytics Problems with Exabeam
sponsored by Exabeam
VIDEO: Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.
Posted: 20 May 2016 | Premiered: 23 Sep 2015

Exabeam

Safeway Gains Visibility and Context into Attacks With Behavior Intelligence
sponsored by Exabeam
VIDEO: It's imperative today to deal with the myriad of threats that organizations deal with daily. Learn how to accelerate your time to attack understanding, reduce response time and create a more efficient security operation.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam

How Equinix Uses Splunk as a Cloud-based SIEM
sponsored by Splunk
WEBCAST: Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM can deliver you instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

Customer Spotlight | blinkbox
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Enhancing the security and performance of your cloud-based applications
sponsored by Verizon
VIDEO: This video shows you how you can securely connect to a variety of leading cloud providers through advanced network services, giving you a reliable end-to-end experience for all your cloud-based applications. Watch now to discover secure, on-demand connectivity to drive growth, improve business performance and gain a competitive advantage.
Posted: 10 May 2016 | Premiered: 25 Feb 2015

Verizon

Prevent Email Breaches with Zix
sponsored by ZixCorp
VIDEO: This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.
Posted: 10 May 2016 | Premiered: 01 Apr 2016

ZixCorp

Eliminating Cybersecurity Blind Spots with Application Awareness
sponsored by Ipoque
WEBCAST: This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.
Posted: 04 May 2016 | Premiered: Apr 26, 2016

Ipoque

Behavior-Based Threat Detection
sponsored by eSentire
VIDEO: This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.
Posted: 19 Apr 2016 | Premiered: 01 Mar 2016

eSentire

Don't Be the Next Cyber Victim
sponsored by eSentire
WEBCAST: The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.
Posted: 19 Apr 2016 | Premiered: Mar 1, 2016

eSentire

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Key Findings on Endpoint Security and Real-Time Prevention
sponsored by Palo Alto Networks
WEBCAST: This webinar contains the results of a study aimed at revealing which endpoint security strategies are most effective at dealing with today's dangerous array of cyber threats.
Posted: 15 Apr 2016 | Premiered: Oct 30, 2015

Palo Alto Networks

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

On-demand Webcast: Top Security Challenges and Best Practices when Moving to the Cloud
sponsored by Intel Security
WEBCAST: Learn about the latest research into secure cloud computing from some of the leading authorities in the industry, such as the foremost security guru from the Cloud Security Alliance, Jim Reavis. You discover how perceptions about cloud computing and security continue to impact adoption, best practices for choosing a secure cloud provider.
Posted: 06 May 2016 | Premiered: Apr 1, 2016

Intel Security

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope
26 - 50 of 149 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement