Blue Coat 10 minute Webcast Series

Blue Coat 10 minute Webcast Series
Blue Coat 10 minute Webcast Series

Compliance without Complexity

This 10 minute webcast features Bob Hansmann, Sr. Product Marketing Manager for Security at Blue Coat.  Listen as he reviews the history of DLP and recent data loss investigations.

Featured Speaker:

Bob Hansmann, Sr. Product Marketing Manager, Blue Coat

Working with Blue Coat Security Labs, he is on top of current trends,  emerging technology directions, malware developments, zero-day threats, botnets, and data leakage involving insider, outsider, or accidental events.  With almost 3 decades in computer security, Mr. Hansmann is a recognized presenter with a real-world, balanced perspective and applicable advice for audiences.

2020 Vision of Web Security

Listen to this 10 minute webcast to learn more about the evolution of web security and what you need to do to protect your business.

Featured Speaker:

Tom Clare, Senior Director of Product Marketing, Blue Coat

As senior director of product marketing at Blue Coat Systems, Tom drives product strategy for the company's Secure Web Gateway solution.  Prior to Blue Coat, Tom held senior product marketing and management positions with Check Point Software Technologies, Qualys and McAfee. His security career began with a federal firewall project in the mid-90s and has encompassed firewall, VPN, encryption, intrusion detection, risk-assessment, anti-virus and proxy solutions. Tom holds a B.S. in computer science from Central Michigan University and an M.B.A. from the University of Texas. 

Click Here to find out more and register for FREE

Sponsored by

Blue Coat

close

Next Article in Vendor Webcasts

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...