Webcast by Topic: Security

Resources available: 59

Data loss prevention

InfoWorld contributing editor Roger Grimes explains the technologies and best practices you need to keep sensitive data safe within your enterprise's boundaries - and ensure only authorized employees gain access.

A Brief History of Malware

Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites or from bots that reside on your own corporate network. Dr. Thomas Chimento of Webroot® Web Security Service will review the evolution of with specific emphasis on the directions that malware is likely to take over the next few years.

ON DEMAND

Get a $20 Amazon Gift Card - Just watch a Demo

iPrism Web Filter, the TCO leader in Web Security, provides everything you need in a single appliance with throughput speeds over 100+ Mbps. iPrism's exclusive transparent bridge mode guarantees that you get exceptional throughput with virtually no latency. Watch an online demo of iPrism and you'll get a $20 Amazon gift card as our way of saying thanks.

ON DEMAND

Insight from an Auditor: Ensuring a Successful PCI Audit

Avoid common pitfalls and learn strategies for ensuring a successful PCI audit from information security and compliance experts.

ON DEMAND

Learning to Love your Log Files

This thirty minute presentation will cover the quick and the dirty of enterprise-wide log management.

ON DEMAND

BRM: What You Can Do To Reduce Risk In Challenging Times

Businesses cannot eliminate risks entirely, but they may reduce the probability of these types of events bringing operations to a halt with business risk mitigation, a method of addressing business risk.

ON DEMAND

IT without Borders: Supporting beyond Corporate Walls

Join us for an interactive Webinar to hear Sean Ryan, IDC research analyst, explore today's workplace terrain and detail why organizations need to extend IT support beyond the four walls of the corporate office.

ON DEMAND

Improving Productivity and Reducing Risk with Secure File Transfer

Join John Roman, Director of Information Law at Nixon Peabody, and hear his insights on how his firm has improved productivity while sending critical data securely with YouSendIt’s managed file transfer solution.

ON DEMAND

A Holistic Approach to Compliance Makes Business Sense

Too often, companies consider compliance a check-box project rather than a strategic process. IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value.

ON DEMAND

Defending against Web 2.0 and Browser Hacks & Attacks Can SaaS Web Security Deliver Higher Protection & Lower Cost?

Gartner’s Peter Firstbrook discusses how to reduce business risk and save budget through SaaS Web security.

©1994-2014 Infoworld, Inc.