IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Security Infrastructure

RSS Feed   
DEFINITION: The integration of physical, logical, and network security and security standards in order to provide a reliable security framework.
Security Infrastructure Multimedia (View All Report Types)
1 - 25 of 99 Matches Previous Page  |  Next Page
Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

Forrester CMD Webinar
sponsored by Cisco Umbrella
WEBCAST: Access this Forrester webinar to learn some of the biggest challenges faced by security pros at organizations of all sizes and what they’re doing to overcome security risk. And discover Cisco Cloud Mailbox Defense, a new email security product engineered with the aim to help security pros address email threats and overcome these challenges.
Posted: 26 Feb 2021 | Premiered: Jul 28, 2020

Cisco Umbrella

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Umbrella - Cisco TV - Transforming IT security with SASE - English
sponsored by Cisco Umbrella
WEBCAST: With the adoption of cloud-delivered services, SD-WAN has proved that it can deliver improved application performance, reduced costs and simplified branch operations. But despite all these benefits, security remains one of the biggest concerns. Leverage this webinar to see how SASE can deliver multiple security functions from the cloud.
Posted: 26 Feb 2021 | Premiered: Apr 8, 2020

Cisco Umbrella

Umbrella - SASE in 15 minutes- English
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason

Ask A CISO Ep. 04: Hard Truths In Cloud Security
sponsored by Horangi
PODCAST: In this episode of the Ask a CISO podcast, Horangi Director of Cloud Security Engineering Steve Teo joins Horangi Deputy Director of Cyber Operations Mark Fuentes to delve into the nature of cloud data breaches today and how organizations in the cloud can adapt to this growing risk – listen in to unlock their expert insight.
Posted: 04 Feb 2021 | Premiered: Feb 4, 2021

Horangi

Cisco Video
sponsored by Cisco
VIDEO: In the era of digital transformations and cloud migrations, security and simplicity are crucial. Watch this short video to learn how your users can ensure a simplified and security cloud migration or digital transformation with SecureX.
Posted: 02 Feb 2021 | Premiered: 14 Jul 2020

Cisco

Improving Security and Compliance in Hybrid Cloud with Automation
sponsored by Red Hat
WEBCAST: Massive global shifts towards hybrid cloud environments are making cybersecurity more difficult to achieve than ever before. This Red Hat webinar offers exclusive insight into how automation can improve security and compliance in hybrid cloud environments – watch now to get started.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Security Compliance and Data Privacy the Open Source Way
sponsored by Red Hat
VIDEO: As our world grows increasingly data-driven, ensuring the privacy and security of customer data becomes a top priority for organizations – especially as each new compliance mandate is enforced. Watch this Red Hat webinar to learn more about the evolving landscape of data security and privacy.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat

Manage Secrets throughout DevSecOps with Red Hat and CyberArk
sponsored by Red Hat
VIDEO: Emphasizing security throughout DevOps, also known as DevSecOps, has become a common practice across organizations. This webinar highlights how identity and access management (IAM) can fit into the software development lifecycle – watch this webinar to explore the role of IAM in DevSecOps.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Achieving security and compliance in Red Hat OpenShift Dedicated
sponsored by Red Hat
VIDEO: In this webinar from Red Hat’s online Security Symposium, join distinguished Red Hat expert Bill Montgomery as he offers a closer look at Red Hat’s OpenShift Dedicated (OSD), highlighting 8 key security and compliance features, the benefits of a hosted vs. self-managed models, and more – watch now to get started.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

Keynote Tackling Security in the World of Containers and Hybrid Cloud
sponsored by Red Hat
WEBCAST: Placing security at the center of your organization’s processes, technology and culture is critical for addressing modern cyberthreats. This webinar features the Chief Security Architect, who offers best practices and strategic insight into successfully adopting a security culture – watch now to get started.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Red Hat

How to Architect a Secure Remote Access Solution Without Sacrificing Performance
sponsored by ThousandEyes
WEBCAST: The COVID-19 pandemic brought on a seismic shift in the way enterprises work and where employees connect from — prompting enterprise IT to quickly scale and update VPN access to cope with increased usage. In this webinar, learn how ThousandEyes remote workforce solution enables IT teams to architect a solution without compromising on performance.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021


Implementing a Hybrid Cloud Using Security & Compliance Automation
sponsored by Red Hat
WEBCAST: Maintaining visibility, control and security while ensuring governance and compliance is paramount. This becomes more difficult and arduous in a hybrid infrastructure consisting of physical, virtual, cloud and container environments. Watch this webinar to see how Red Hat can help you with these challenges by automating security and compliance.
Posted: 22 Jan 2021 | Premiered: May 14, 2020

Red Hat

Avoiding the Crippling Effects of Ransomware through Early Detection & Response
sponsored by Fidelis
PODCAST: Ransomware remains high on the list of security concerns for enterprises, CISOs and CIOs. But early detection can help your organization, and it’s key in avoiding significant damage and cost. Tune into this podcast to hear former NSA CISO Chris Kubic as he discusses why ransomware is so dangerous and how to protect against it.
Posted: 21 Jan 2021 | Premiered: Jan 21, 2021

Fidelis

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat
1 - 25 of 99 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info