Shouldn't an Intrusion Detection System (IDS) Actually Detect Intrusions? Date: Nov 03, 2015 View webinar In recent years, Intrusion Detection Systems have ceased to live up to their name. As they progressively lose the ability to spot active intrusions, sophisticated cyber attackers are using more evasive and strategic intrusions that spread rapidly through the network - leaving security teams without the proper tools and insight to identify threats that pose the greatest risk to the organization. In this presentation, we will analyze new approaches to intrusion detection, and how they apply to today's most advanced attacks.
IT Security Vulnerabilities: How to Understand & Respond Date: Oct 29, 2015 View webinar In this editorial video webinar, a unique panel of top industry experts will discuss methods for evaluating the relevance and importance of new vulnerabilities, and for developing a remediation process that prioritizes the most critical vulnerabilities in your specific enterprise.
Geek-Out: 30-Minute Deep Dive into open source object storage Date: Oct 28, 2015 View webinar Ceph is a breakthrough open source object storage platform that offers exabyte scalability, self-healing fault tolerance, and great performance on standard hardware. So if you're responsible for making sure your company can cost-efficiently store its relentlessly proliferating rich media content--including documents, images, video and audio files--you need to know about Ceph. Register today!
ITSM: Be your own Broker - Service Management for the next decade Date: Oct 27, 2015 View webinar In this webinar we'll discuss service brokering as the next phase in service management. You'll learn basic requirements for IT service brokering, how to get started without rip-and-replace and what benefits you can expect. You'll hear several customers' success stories on IT service brokerage.
The Mutation of Malware - Launch, Detect, Evolve Date: Oct 22, 2015 View webinar In order to hit their targets, malware developers need to constantly evolve their tactics. This evolution is frequently done in very small incremental changes to known malware attacks. Attend this webinar and learn about new malware tactics, what cyber criminals are doing to evade detection and what you can do to protect your company now and in the future!
Hybrid Cloud: Be Agile and Powerful Date: Oct 22, 2015 View webinar Successful hybrid cloud implementations are all about being more than the sum of their parts: more than just public cloud API calls, more than a private cloud running on premises, more than just agility and power by themselves.
Register for this wenbinar and find out how your hybrid cloud can be more than the sum of its parts.
Considerations When Moving Your Organization To The Cloud Date: Oct 15, 2015 View webinar Does the idea of moving your enterprise data and infrastructure to the cloud fill you with fear, uncertainty, and doubt? If so, you're not alone. We'll take you behind the scenes to look at what cloud provider certifications, and ratings really mean. We'll guide you on the right questions to ask to ensure you have a solid RFP to help you make strategic decisions. And we'll pay special attention to how your operations team and that of your provider can reduce the risk of downtime.
Build Your Software Securely Date: Oct 15, 2015 View webinar This webinar will provide an overview of the software development landscape across different industry verticals. We will talk with secure development experts from Veracode and others on the best practices to measure application portfolio risk, implement practical steps for remediation of software vulnerabilities, and motivate development teams to embed these concepts into the software development lifecycle.
Analytics Best Practices: Plan for the Human Factor Date: Oct 14, 2015 View webinar Chris Mazzei, global chief analytics officer at Ernst & Young joins All Analytics Radio to discuss this human element of analytics. He is an advocate for understanding not just what data you have and what the data says but how your business can use it. Register today and hear what he has to say!
Protecting Your Users From Online Attackers Date: Oct 13, 2015 View webinar What's the best way to protect your users -- and prevent them from making mistakes that might lead to a broader data breach? What are the best practices and technologies for protecting an endpoint that is constantly evolving? And how can enterprises consistently enforce endpoint security policies that apply to everyone, from the mailroom to the executive suite?
In this informative webcast, top security experts will discuss some of the latest threats faced by enterprise end users today - and what you can do about them.
Integrated Communications & Collaboration: The Key to Insurance Omnichannel Success Date: Oct 07, 2015 View webinar In this webinar, Forrester Research and Interactive Intelligence examine:
- Emerging influences in the insurance shopping and service journey
-How omnichannel is changing how insurers communicate with customers and prospects
- Why integrated communications is a key component in the omnichannel strategy
- How collaboration and awareness of the policyholder journey can improve customer service
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.