sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST:
Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)
WEBCAST:
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
WEBCAST:
This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
WEBCAST:
Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
WEBCAST:
View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
TRIAL SOFTWARE:
When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
VIDEO:
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.