Webcast by Topic: Security

Resources available: 50

Preventing Data Breaches with Data Access Governance

Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.

The Current State of Identity and Access Management

Organizations have realized that the traditional approach to IAM doesn't work. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.

The Need for a New Approach to Provisioning

Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning.

See what Security, Reliability and Efficiency looks like

The new System x servers with Intel ® Xeon ® processors offer innovative technology, offer innovative technology with exclusive new advanced security features to provide enterprise class data protection.

Best Practices in Virtualized Protection for 2014

Jason Buffington, ESG Sr. Analyst, discusses ESG's research findings on protecting highly virtualized environments, looking at such topics as server hypervisor adoption/preferences, general data protection trends and more.

Cloud and Collaboration: Driving Your Business Value

Mission Critical Cloud from Peer 1 Hosting is enterprise-grade.

Data Breaches - Don't Be a Headline

Whether it's a HIPAA/HITECH, Sarbanes Oxley, Gramm-Leach-Bliley violation, or a State breach notification law, a data breach can have substantial legal and financial consequences, regardless of industry.

Business-driven Data Protection

Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the Arcserve team will offer insights and solutions to make data protection a strategic component of your business.

On-Demand Webinar: Mind the Gap!

Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to meet and elevate IT to a strategic service provider.

Don't Believe the Hype: Not All Containers are Created Equal

Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM as the foundation for mobile security.

©1994-2014 Infoworld, Inc.