Search Results for: security

Live From Black Hat 2024 Securing Machine Identities In 2024 & Beyond
What is the state of machine identity security in 2024, and what are the most important things to know about securing them for the future? Find out in this webcast, in which leaders from Enterprise Strategy Group and CyberArk discuss the biggest risk factors of machine identities in modern enterprises – and more.

CyberArk

Cisco Protects the Bridge to the Possible by Holistically Securing Human and Non-human Identities
Cisco uses the CyberArk Identity Security platform to provide dynamic and one-click privileged access that staff need to deliver and develop services to customers and to accelerate and secure DevOps pipelines with a dynamic secrets management strategy.

TOPICS: .NET
CyberArk

Navigating Hybrid and Multi-cloud Complexity: A Smarter Path to Secure Application Delivery
ph

A10 Networks

Identity Protection for the SOC
For security teams, their legacy identity management solutions are no longer suited for securing today’s environments. Combining 2 distinct identity security technologies, IBM Verify Identity Protection presents an approach to identity security that is designed to meet today’s threats. Watch this webcast to learn more about the emerging solution.

TOPICS: .NET
TD Synnex

Endace Video 9
In this webcast, Plixer’s VP of Field Operations joins Endace’s Michael Morris for a discussion about security strategies. Watch now to learn about the challenges of security at scale and to understand where many organizations are falling short in their security postures.

TOPICS: .NET
Endace

Risk Mitigation Best Practices Based on Recent Breaches
Recent security breaches are shaping the way the security landscape looks moving forward. In this webcast, CyberArk Senior Offensive Security Research Evangelist, Andy Thompson, sits down with CyberArk Field CTO, David Higgins, to discuss risk mitigation best practices based on recent breaches. Watch now to learn more.

TOPICS: .NET
CyberArk

Zimperium
Mobile security is crucial to federal business operations. In this first part of Merlin’s Mobile security masterclass, Merlin Technical Sales Leader, Chris Hauser, joins Zimperium Vice President of Global Pre-Sales, Kern Smith, for a discussion about the state of mobile security for federal organizations. Watch now to learn more.

TOPICS: .NET
Merlin International

Utimaco Explainer Movie
This brief explainer video breaks down Utimaco’s approach to security, highlighting the strategy and philosophy behind their approach, and how they help secure organizations with on-premises and as-a-service solutions. Watch the full explainer now to learn more.

TOPICS: .NET
Utimaco

Are You REALLY Safeguarding Your Backup Data?
Ransomware attacks are not only more prevalent, they’re also more dangerous. In this webcast, Cobalt Iron’s Chris Snell shows you how you can leverage 6 essential security technologies to take a stand against ransomware and secure your organization. Watch now to learn more.

TOPICS: .NET
Cobalt Iron

Endace Video 16
“What’s life really like for a security analyst?” In this episode of Endace’s “Secure Networks: The Packet Forensics Files,” host Michael Morris poses this question to a SOC expert from IBM. View now to discover the answer.

TOPICS: .NET
Endace