WEBCAST:
This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
TRIAL SOFTWARE:
This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
WEBCAST:
Watch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
WEBCAST:
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
WEBCAST:
This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
WEBCAST:
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
SOFTWARE DEMO:
Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.
VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.