Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • Please join us for a live Q&A session on Monday April 27th at 3:30pm AEST / 5:30pm NZST, with Steve Durbin, Managing Director of the Information Security Forum, on the ISF's Threat Horizon 2017 Report.

    Threat Horizon Report, released last month, is a detailed examination of potential current and future security threats facing organisations.

    Meticulously researched by the ISF, the report:
    •covers nine threats poised to overwhelm defences
    •identifies potentially significant business impacts
    •proposes actions that organisations can take to safeguard their reputation and wider business value

    Before the Q&A:

    •Read about the Threat Horizon Report in CIO Magazine: (http://www.cio.com/article/2898037/security0/9-biggest-information-security-threats-for-the-next-two-years.html#slide1)

    •Or view the BrightTalk Webinar: https://www.brighttalk.com/webcast/9923/140635

    •If you'd like, please send any questions you want to ask to Vicky Taylor, by Thursday April 23rd (vtaylor@shelde.com)

    Q&A Details:

    During the Q&A Session Steve will take any questions you have on the report and its findings.

    Date: Monday April 27th

    Time: 3:30pm to 4:15pm AEST / 5:30 - 6:15pm NZST
  • Data governance is a top strategic priority for financial institutions, and implementing a best-in-class framework requires investment in the right people, processes and technologies. FIMA, the Financial Information Management Association for reference data professionals, has compiled its first annual FIMA benchmarking report to further evaluate the challenges and opportunities present for optimizing a data governance strategy.
  • As Git gains in popularity and Subversion extends its features for enterprise development, the two often operate side-by-side. This session will outline the benefits of each system (centralized vs. distributed), and how to best support a hybrid deployment.
  • Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
    • Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
    • Deliver automated security across environments
    • Ease security deployment and management for lower cost of ownership
    • Automate security deployments while increasing protection for virtual environments.
  • Companies operating data center in areas prone to earthquakes need to take a systematic approach to quantifying and mitigating their risk. For several years, Molly managed disaster recovery planning for a large Southern California utility. During her tenure, she commissioned two "seismic audits" of three data centers located in the region. Through these studies, she was able to inform management about the level and probability of the risk of losing the use of all three locations following an earthquake. This presentation will describe the techniques used and the benefits the study brought.
  • Organizações de todos os setores estão investindo em Governança de dados para obter valor de seus dados e cumprir com as regulamentações da indústria: reduzir custos, aumentar as vendas e aumentar as margens de lucro.
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • Changing IT needs and complex infrastructures require flexible and dynamic solutions to help you transition your environment. The release of Symantec™ Backup Exec 15 is the perfect time for you to review your backup and recovery infrastructure to meet these changing demands. Whether you are an existing Backup Exec customer or not, now is the time to upgrade to a reliable choice; the leading-edge offering for virtual, physical and cloud platforms.

    Join us to understand how Backup Exec 15 provides the flexibility to protect confidently whatever your platform, technology or application need. Delivering the power to protect your information faster, restore what you need when you need it and the ease the time and burden of “doing backup.
  • It is no secret that we live in a 24/7 world that demands information be always available, always accurate and always secure. In order to meet these demands a comprehensive risk management program must be in place. At the forefront of these efforts are the preventive measures that try to reduce the probability of a disruptive incident occurring. But as has been all too often the case, these protective actions may not be enough. Whether it be the force of nature, the actions of terrorists, the fragility of infrastructures or so many other disruptive events will and do happen.

    Left with the reality that we must prepare for interruptions to occur, the job of the Business Continuity Professional is to minimize the resulting impacts. Creating environments that will provide connectivity, processing and data integrating, more and more organizations are looking toward the clouds. Whether it be to ensure that data can be shared or looking for full automated recovery cloud computing has a possible answer. This presentation will discuss what the cloud is, how it can make organizations more resilient and some of the issues pertaining to its usage.
  • Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

    The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:

    • Risk Management
    • Physical Security
    • Emergency Management
    • Cyber Security/ Information Technology

    Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
  • Risk management is an increasingly important
    business driver and stakeholders have become
    much more concerned about risk. Risk may be a
    driver of strategic decisions, it may be a cause of
    uncertainty in the organisation or it may simply be
    embedded in the activities of the organisation. An
    enterprise-wide approach to risk management
    enables an organisation to consider the potential
    impact of all types of risks on all processes,
    activities, stakeholders, products and services.
    Implementing a comprehensive approach will
    result in an organisation benefiting from what is
    often referred to as the ‘upside of risk’.
    The global financial crisis in 2008 demonstrated
    the importance of adequate risk management.
    Since that time, new risk management standards
    have been published, including the international
    standard, ISO 31000 ‘Risk management –
    Principles and guidelines’. This guide draws
    together these developments to provide a
    structured approach to implementing enterprise
    risk management (ERM)
  • Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. Founded in 1787, the University of Pittsburgh is one of the oldest institutions of higher education in the US and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, University of Pittsburgh will share their story and you will learn how they:
    - Optimize data center resources with virtualization aware security
    - Deliver automated security across environments
    - Manage and deploy security efficiently
    - Achieve cost effective compliance
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • Ingesting raw data into Hadoop is easy, but extracting business value leveraging exploration tools is not. Hadoop is a file system without a data model, data quality, or data governance, making it difficult to find, understand and govern data.

    In this webinar, Tony Baer, Principal Analyst of Ovum Research, will address the gaps and offer best practices in the end-to-end process of discovering, wrangling, and governing data in a data lake. Tony Baer will be followed by Oliver Claude who will explain how Waterline Data Inventory automates the discovery of technical, business, and compliance metadata, and provides a solution to find, understand, and govern data.

    Attend this webinar if you are:
    --A big data architect who wants to inventory all data assets at the field level automatically while providing secure self-service to business users
    --A data engineer or data scientist who wants to accelerate data prep by finding and understanding the best suited and most trusted data
    --A Chief Data Officer or data steward who wants to be able to audit data lineage, protect sensitive data, and identify compliance issues
  • Targeted malware, zero-day vulnerabilities and advanced persistent threats are increasingly responsible for data breaches. Why? Because they work. Most security products have a hard time protecting from advanced malware. This problem is compounded because attackers can easily mass produce new malware variants. What’s an IT person to do?

    Join us to learn key techniques to stop modern malware the first time. We will discuss:
    •What tactics work
    •Where to apply them
    •How to optimize cost, staffing and security.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • Set aside 30 minutes on Wednesday, April 29th as we explain in more detail how your data is vulnerable as it moves across data networks. During our session, "Surveillance: You ARE being watched" we’ll uncover security issues and risks, as well as new features and affordable solutions.
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Webcast highlights include learning how to:

    - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

    - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)
  • In this webinar you will learn more about the AddressDoctor spring release 5.7.0:

    •Improved Coverage of Business Names and Addresses in the United Kingdom
    •Building-Level Rooftop Geocoding for United Kingdom
    •Ability to Retrieve UPRN as Enrichment for United Kingdom Addresses
    •Ability to Retrieve Province ISO Codes in Batch, Interactive, and Fast Completion Results
    •Multi-Language support for localities in Switzerland
    •Ability to Retrieve NIS Code as Enrichment for Belgium Addresses
    •New point geocoding feature for Australia
    •Ability to Remove Locality and Province Descriptors from China and Japan Addresses
    •Improved Parsing and Validation of India Addresses
    •Ability to Retrieve FIAS ID as Enrichment for Russia Addresses
    •Introduction of Cyrillic Script for Bulgaria Addresses
    •Ability to Validate Slovakia Addresses that Contain Street Name Abbreviations
  • Information is the lifeblood of any business. If the data required to operate and maintain market presence becomes inaccessible, compromised, or worse – unrecoverable, the business impact could be devastating. Learn about the existing and emerging risks to your critical data infrastructure and business operations. What mitigation strategies are available and what considerations do you need to assess? How does the changing landscape for consumption of IT such as cloud, on-premise, and hybrid solutions effect survivability and securitization of your prized assets?
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.

    However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.

    During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
  • Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • In a world where your most sensitive business content is being shared with more people outside of your organization, you fear losing visibility and control. Join us for this special edition webinar to learn how Syncplicity extends your enterprise security polices to protect your sensitive documents as they move beyond your corporate boundaries, giving you back security, visibility, and control.