Webcast by Topic: Security

Resources available: 30

APTs: They're advanced and persistent but they are not malware!

During this webinar, industry experts will talk about advanced threats, discuss a broad-spectrum approach to advanced threat defense and how to gain visibility over the entire threat life cycle.

May 7, 2014 - LIVE AT 9:53 AM PT

LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.

Traditional backup is going away, but where does this leave end-users?

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

How to Protect Enterprise Data Yet Enable Secure Access for End Users

Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and steps for better protecting enterprise data while providing end users with secure data access.

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Ecommerce Site Needs Protection Against Cyber 'Pirate'

Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.

Tales from the Trenches - Industry Risks and Examples of DDoS

Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more.

Step Up to the IT Security Challenge

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers.

Streamline Software Asset Management, Compose a software Management Symphony

Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel

Answering the Tough Question: Who Has Access to What?

Learn how to select specific users or groups in Active Directory (AD), and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

©1994-2014 Infoworld, Inc.