Video: IT Priorities 2023 APAC
sponsored by TechTarget ComputerWeekly.com
VIDEO:
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
Posted: 30 Mar 2023 | Premiered: 30 Mar 2023
|
|
|
IT Priorities 2018 - What's happening in security?
sponsored by TechTarget ComputerWeekly.com
VIDEO:
In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018
|
|
|
Unlocking the Value of Data, Securely with AWS and Privitar
sponsored by Privitar, AWS
VIDEO:
This webinar explains the importance of modern data security compared with the traditional data security system. Tune in to learn how you can elevate your security with the AWS Cloud.
Posted: 12 Jun 2020 | Premiered: 12 Jun 2020
|
|
|
Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR:
Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014
|
|
|
Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST:
Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014
|
|
|
Security Operations Center (SOC) Essentials for the SME
sponsored by AT&T Cybersecurity
WEBCAST:
Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014
|
|
|
Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST:
This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014
|
|
|
Webinar: 20 Critical Controls for Cyber Defense
sponsored by ISACA
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
|
|
|
Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST:
This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014
|
|
|
Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE:
Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014
|
|
|
Take Control of Critical Information for Your Employees' Sake
sponsored by Clearswift
WEBCAST:
This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
Posted: 20 May 2014 | Premiered: May 20, 2014
|
|
|
Webcast: Symantec Internet Security Threat Report 2014
sponsored by Symantec Corporation
WEBCAST:
Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
Posted: 09 May 2014 | Premiered: May 9, 2014
|
|
|
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST:
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)
|
|
|
Keep Endpoint Data Safe
sponsored by Code42
WEBCAST:
This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014
|
|
|
From SIEM to Security Analytics: The Path Forward
sponsored by EMC Corporation
WEBCAST:
Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012
|
|
|
Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST:
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012
|
|
|
Navigating Security in a Mobile World
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT:
This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014
|
|
|
Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE:
This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014
|
|
|
Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST:
In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
Dell Data Protection
sponsored by DellEMC and Intel®
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014
|
|
|
2014 Ultimate Buyers Guide to Endpoint Security Solutions
sponsored by Lumension
WEBCAST:
This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014
|
|
|
Application Whitelisting Best Practices: Lessons from the Field
sponsored by Lumension
WEBCAST:
This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014
|
|
|
Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST:
This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014
|
|
|
Security Analytics Security School
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT:
Learn how to develop a customized program that delivers insightful, actionable security analytics. Key points of emphasis include defining success, identifying needs, developing and integrating data sources, and ultimately analyzing information and using it to make smarter security decisions.
Posted: 07 Feb 2014 | Premiered: 14 Feb 2014
|
|
|
Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST:
This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014
|
|