Management of Security Multimedia

(View All Report Types)
Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Prevention Is Your First Line of Defense from Ransomware. But What If Prevention Fails? (VIDEO)
sponsored by StorageCraft Technology Corporation
VIDEO: Prevention is Your First Line of Defense From Ransomware. But What if Prevention Fails?
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

StorageCraft Technology Corporation

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

The New Style of Business
sponsored by Hewlett Packard Enterprise
WEBCAST: This short webcast highlights some of the biggest technologies that are affecting businesses today, and what they mean for the role of IT.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett Packard Enterprise