Hi [[ session.user.profile.firstName ]]

Cybercrime's Favorite Target - The Crown Jewels in Your Databases

Despite facing an ever-growing number of cyber-threats targeting highly sensitive and valuable information, many organizations fail to establish a last line of defense for their business-critical databases without compromising performance for threat protection. Join security experts from (ISC)2 and
Despite facing an ever-growing number of cyber-threats targeting highly sensitive and valuable information, many organizations fail to establish a last line of defense for their business-critical databases without compromising performance for threat protection. Join security experts from (ISC)2 and McAfee on August 16, 2012 at 1:00pm Eastern time for a discussion on how the right database security strategy and posture can help organizations of all sizes and types achieve robust security, continuous compliance, and optimal security management costs and practices.
Recorded Aug 16 2012
59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brandon Dunlap, Brightfly (Moderator); Patricia Zullo, Dir, Database Security Sales, McAfee; Chris Trautwein, ISO, (ISC)2;
Presentation preview: Cybercrime's Favorite Target - The Crown Jewels in Your Databases
Recommended for you:
  • Date
  • Rating
  • Views
  • Health Management in Your Data Center Just Got Easier with Intel Virtual Gateway Health Management in Your Data Center Just Got Easier with Intel Virtual Gateway Russ Sprunger, BDM- Intel Data Center Solutions - George Clement, Intel Data Center Solutions, Senior Application Engineer Recorded: May 24 2016 32 mins
    Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.

    In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.

    Highlights of the Four Main Pillars:
    •Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
    •Analytics: root cause with health details, failure device report severity indication, and health history.
    •Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
    •Remediation: remote power on/off and remote vMedia
  • Evolution of iSCSI including iSER, iSCSI over RDMA Ethernet Evolution of iSCSI including iSER, iSCSI over RDMA Ethernet Fred Knight, Standards Technologist, NetApp, Andy Banta, Storage Janitor, SolidFire/NetApp, David Fair, Chair, SNIA-ESF Recorded: May 24 2016 62 mins
    iSCSI is an Internet Protocol standard for transferring SCSI commands across an Ethernet network, enabling hosts to link to storage devices wherever they may be. In this Webcast, we will discuss the evolution of iSCSI including iSER, which is iSCSI technology that takes advantage of various RDMA fabric technologies to enhance performance. Register now to hear:

    •A brief history of iSCSI
    •How iSCSI works
    •IETF refinements to the specification
    •Enhancing iSCSI performance with iSER

    The Webcast will be live, so please bring your questions for our experts.
  • Education Enterprise Mobility Management: Create a Dynamic Institution Education Enterprise Mobility Management: Create a Dynamic Institution Sean Ferrel, President & CEO Recorded: May 24 2016 34 mins
    Tune in to this webcast to learn how educational institutions can simplify IT, improve security, and empower your mobile workforce.

    Create a dynamic and diverse institution that gives educators the tools to inspire students to consume and create knowledge

    •Empower your mobile workforce with the tools needed to stay productive anywhere

    •Unify your IT with single sign-on to access all apps and data, alongside self-service capabilities and integrated mobile device management (MDM).

    •Protect your data with a comprehensive set of capabilities for access control and data security.
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Agenda:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager Recorded: May 24 2016 30 mins
    See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.

    In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.

    During the interactive session, you’ll see how to:
    • Ensure only authorized users and approved devices are granted access to your business network
    • Quickly and easily provision secure mobile access and role-based privileges
    • Keep company data secure in-flight and at rest on devices
  • Accelerating App Development with Continuous Integration Kubernetes on OpenStack Accelerating App Development with Continuous Integration Kubernetes on OpenStack Craig Peters, Dir of Product Management; Joey Yep, Sr Manager Technical Marketing; Nick Chase, Head Tech & Marketing Content Recorded: May 24 2016 59 mins
    Kubernetes is emerging as a standard target API for applications. Several solutions exist for helping developers get the most out of Kubernetes. But by themselves these PaaSes do not create the conditions required for continuous measurement and improvement of application development. During this presentation we will present a solution that captures the metrics required for your organizations to build the practice of constantly measuring and improving into the software development lifecycle.
  • How OneUnited Bank is Transforming the Banking Experience Through IT How OneUnited Bank is Transforming the Banking Experience Through IT James Slocum, CIO, OneUnited Bank | Izzy Park, Salesforce Product Marketing Manager, App Cloud Recorded: May 24 2016 24 mins
    On the heels of launching its most successful online banking product in company history, OneUnited Bank is digitally transforming the community bank experience.

    James Slocum, OneUnited Bank Chief Information Officer, shares how his IT team leveraged Salesforce App Cloud to bring its one to one customer experience online without compromising customer data and trust.
  • Building the Next Generation Branch Building the Next Generation Branch Chris Rogers, Director of Cloud Infrastructure, Silver Peak and Amit Jain, Sr. Product Manager, Nutanix Recorded: May 24 2016 60 mins
    As companies expand and rapidly bring new branches online, the need arises to quickly establish connectivity to the datacenter and cloud applications - as well as build the extended network infrastructure. However, the skyrocketing cost and length of time required to connect users to applications via MPLS coupled with the disparate nature of the branch infrastructure is putting increased pressure on IT budgets and resources. While costs soar and time to market increases an organization’s competitiveness is compromised.

    Nutanix, delivering invisible infrastructure for next-generation enterprise computing and Silver Peak, the leader in building broadband and hybrid wide area networks, have partnered to deliver a combined solution that solves this problem – dramatically driving down costs, increasing performance and accelerating branch deployments.

    Join this webinar to learn how you can:

    •Eliminate under-utilized infrastructure silos, using up to 80% less space and 50% lower CAPEX
    •Save up to 90% in WAN OPEX by leveraging broadband vs MPLS
    •Speed up deployment with rapid connectivity, a turn-key infrastructure and zero-touch deployment of broadband WAN
    •Securely connect and accelerate remote office applications
    •Achieve centralized management and control with enhanced visibility into the network and applications
  • Building the Next Generation Branch Building the Next Generation Branch Chris Rogers, Director of Cloud Infrastructure, Silver Peak and Amit Jain, Sr. Product Manager, Nutanix Recorded: May 24 2016 60 mins
    As companies expand and rapidly bring new branches online, the need arises to quickly establish connectivity to the datacenter and cloud applications - as well as build the extended network infrastructure. However, the skyrocketing cost and length of time required to connect users to applications via MPLS coupled with the disparate nature of the branch infrastructure is putting increased pressure on IT budgets and resources. While costs soar and time to market increases an organization’s competitiveness is compromised.

    Nutanix, delivering invisible infrastructure for next-generation enterprise computing and Silver Peak, the leader in building broadband and hybrid wide area networks, have partnered to deliver a combined solution that solves this problem – dramatically driving down costs, increasing performance and accelerating branch deployments.

    Join this webinar to learn how you can:

    •Eliminate under-utilized infrastructure silos, using up to 80% less space and 50% lower CAPEX
    •Save up to 90% in WAN OPEX by leveraging broadband vs MPLS
    •Speed up deployment with rapid connectivity, a turn-key infrastructure and zero-touch deployment of broadband WAN
    •Securely connect and accelerate remote office applications
    •Achieve centralized management and control with enhanced visibility into the network and applications

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybercrime's Favorite Target - The Crown Jewels in Your Databases
  • Live at: Aug 16 2012 5:00 pm
  • Presented by: Brandon Dunlap, Brightfly (Moderator); Patricia Zullo, Dir, Database Security Sales, McAfee; Chris Trautwein, ISO, (ISC)2;
  • From:
Your email has been sent.
or close
You must be logged in to email this