www.fgks.org   »   [go: up one dir, main page]

Upcoming Vendor Webcasts

Borderless security: confidence in a virtual world

October 29, 2010

With the recent surge in workforce mobility, social networking and Web 2.0, organizations today face a new generation of threats that jeopardize the traditional corporate umbrella.While these areas are creating exciting new ways to connect with employees, customers and clients, they are also expanding the borders of the traditional enterprise and therefore introducing new avenues for potential breaches in security.
 

Virtual Segmentation - Beyond the Firewall

November 15, 2010

The key to lowering the total cost of implementing PCI DSS is to limit the number of in-scope systems to the absolute minimum. Limiting can be done by separating these systems from the rest of the network. Internal network segmentation is also needed to separate development teams from production systems, to prevent "leapfrogging" by third-party and internal IT support, and for other applications.
 

Vendor Webcasts

10 Minutes on Universal Log Management

November 04, 2010

How many log management solutions does it take to mitigate cybersecurity risks, demonstrate compliance and streamline operations?
 

10 Minutes on Automating Database Vulnerability Assessment to Prevent Data Breaches

October 11, 2010

Databases have, by far, become the leading target of hackers and insiders with malicious intentions. According to Verizon's 2010 Data Breach Investigations Report, 92% of breached records originated in database servers. The fact that they contain organizations' most valuable data, such as customer records, financial information, employee PII and credit card data make them an attractive target.
 

The Compliance Factor: Protecting your Customer Data and Your

October 07, 2010

Government has had an increasingly heavy hand in how U.S. businesses protect their networks and the sensitive data within them by introducing legislation with major IT security implications, such as HIPAA, NERC and SOX. In the case of PCI DSS, the industry is self-regulating to try and stay ahead of government actions. With increasing demand for stronger levels of privacy and protection from malicious threats, companies must meet ever-evolving requirements or risk having both their reputations and revenue streams destroyed by breaches and the bad publicity that ensues.
 

Cloud Security: The IDentity Factor

August 20, 2010

If you're building out your Cloud Security strategy - or already have one in play - you will not want to miss this Webinar. In "Cloud Security - the Identity Factor", Ping Identity's CTO, Patrick Harding, will discuss the critical role of Identity in Cloud Security. The Webinar will address the dangers of synchronizing passwords, and why Internet Single Sign-On is a secure alternative.
 

A Practical Approach to DLP: Dive in!

July 27, 2010

DLP projects have tended to founder in complexity - and a lot of that is the discussion of hypothetical cases: what if we find this? How should we escalate or define a process if we find that? But many organizations report that what they find with DLP technology is often very different from what they thought they would.
 

BeyondTrust 10 minute Webcast Series

July 06, 2010

Drawbacks of Open Source Privileged Identity Management, Least Privilege Application Compatibility for Windows 7 Migrations, & Top 5 Things You Should Do for Your Virtualized Environments
 

Blue Coat 10 minute Webcast Series

June 28, 2010

Compliance without Complexity & 2020 Vision of Web Security
 

Pros and Cons of Different Strong Authentication Options

June 25, 2010

Join Imprivata in exploring which authentication modality is right for your organization. This session will explore the pros and cons of user authentication options in addition to reviewing how you can mix and match various modalities to provide greater security.
 

Detecting dangerous PDFs and application layer threats.

May 27, 2010

Malware making use of PDF files is one of many complex threats that are "moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to detect and remediate these advanced threats.
 

Combating modern threats and risks

May 26, 2010

Join ArcSight security expert, Ryan Kalember, Director of Product Marketing, as he discusses how organizations can best defend against cyberthreats that have grown substantially in sophistication and potential to cause harm. This webinar will explore the commonalities among the latest breaches and detail the most pervasive new techniques. Attendees will learn how user activity monitoring techniques can be used to detect these new attacks