Upcoming Vendor Webcast


Why manufacturers are using the cloud to deliver infosec

We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

Turning tables on cybercriminals

The attacker defender asymmetry is well known. While it's impossible to defend all possible places of network compromise, defenders can shift the balance in their favor once the attacker has breached an endpoint.

Six steps to SIEM success sponsored by AlienVault

Tune in for this webcast to learn 6 practical steps every IT admin should take before embarking on a SIEM deployment.

How to build a world-class threat intelligence capability from scratch

Threat intelligence is a broad subject and the natural tendency is to produce intelligence on any topic or event regardless of its applicability to the company. True success in threat intelligence depends on focusing intelligence efforts to very specific business objectives, which removes the large surface area and leaves only a challenging sliver of ultra-high value to pursue.

Keeping compromises from becoming breaches

The stakes have never been higher as businesses attempt to protect their assets from a barrage of threats that continue to grow in frequency and sophistication.

Visual hacking high-risk areas in vertical industries

While visual hacking is a threat to any industry, it can be especially dangerous in healthcare and financial industries, where some of the most sensitive personal and financial information is routinely accessed and displayed.

Cover your "What happens off-network, stays off-network" security gap

We know that "What happens in Vegas, stays in Vegas" is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network?

Behavioral analytics: How one company used it to change data protection forever

The rate at which new data breaches are announced in the headlines should alarm every company with sensitive data to protect. From OPM to Ashley Madison to Machine Zone video games, data breaches are going undetected by existing security technologies and processes.

Enterprise security is about to get dramatically simpler

Ixia will change the landscape of network security by introducing a powerful new front line of defense for enterprises worldwide. Be one of the first to learn about this new security solution that will change the way enterprises view inline security protection.

Don't let sensitive data hitch a ride out of your network

Data is at the core of every business, and data theft is one of the most potent risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences of customer defection.

Sign up to our newsletters