sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST:
Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)
VIDEOCAST:
In this videocast you'll learn about solutions for physical, virtual, cloud and application data protection and what you need to do to ensure your data is both protected and accessible.
VIRTUAL ENVIRONMENT:
This in-depth webcast, presented by Daniel Galecki, a software veteran and IT asset management guru, covers the IT transformation from a cost center to an IT service broker, and explains why analysts agree that chargeback is critical to the success of your cloud projects.
WEBCAST:
Watch this webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis.
WEBCAST:
This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
WEBCAST:
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
WEBCAST:
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.
Posted: 05 Jun 2014 | Premiered: Jun 24, 2014, 16:00 EDT (20:00 GMT)
VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
WEBCAST:
Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.