Adobe Acrobat X: Reduce Risk and Protect Documents

Rick Borstein, Senior Solutions Consultant, Adobe & Mark Middleton, Business Development Manager, Adobe
Control your work and help secure sensitive information. Attend this webinar to hear about best practices for implementing security policies and how Acrobat X and Reader X implement security standards.

In this presentation, you will learn how to:
- Protect information - use Adobe Acrobat Pro X to set permissions, limit access and control user interaction
- Save time and accelerate document workflows with electronic document signatures
- Permanently remove content and metadata from a document to expedite sharing
Jun 28 2012
60 mins
Adobe Acrobat X: Reduce Risk and Protect Documents
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4539)
  • Upcoming (145)
  • Date
  • Rating
  • Views
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • Successful organizations run on key metrics and IT security should be no different. But which security metrics should operations, management and the boardroom be focused on? Factories focus on “days without an accident” Is the cyber parallel “days without a breach?”
    What to measure, how to measure, and how to communicate performance is key to improving the security team’s effectiveness and standing within the organization. Information like:
    - Which departments have access to which servers?
    - Who are the privileged users and when are they most active?
    - Where are the assets with vulnerabilities that can be reached from outside?
    - When are security defenses like firewalls likely to maxout?
    Join Dr. Larry Ponemon, Chairman & Founder of the Ponemon Institute, for key results of a new research study on security metrics and change management, and Jody Brazil, Founder, President and CTO of FireMon, for a pragmatic perspective on generating actionable metrics from your network security infrastructure and reducing the risks of relentless change.
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Join us to hear from product expert Rob Singh to learn more about Mocana Atlas Certificate Enrollment
  • Collaboration is crucial when it comes to your marketing team. No matter if you're based locally or globally, the concept of work and the way we interact is completely changing. With smartphones and tablets taking over our lives, efficient collaboration, coordination, and consistency around marketing campaigns and messaging can be challenging when running a marketing organization.

    Join this webinar to discover:

    - The latest and greatest in marketing automation and file sharing platforms
    - Content collaboration tools that save time and keep branding consistent between teams
    - How centralizing assets can ease global content translation and localization
    - Real-time content and campaign sharing that can spark new ideas and educate your organization
  • Organizations of all sizes face a number of industry and regulatory compliance mandates. Whether its PCI DSS, SOX, HIPPA or FISMA, these regulations are changing to accommodate the ever-growing threat to sensitive data.

    Join Dave Shackleford, IT security consultant and founder of Voodoo Security, as he breaks down these updated requirements and how to remain current while securing your business.

    Attend this webcast and learn:
    - Best practices for protecting data in today’s complex security landscape

    - Latest updates to compliance mandates pertaining to data encryption

    - What these updates mean to your security teams.
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Performance Benchmarking for Private and Hybrid Cloud Jun 11 2014 6:00 pm UTC 45 mins
    Learn why benchmarking your current network and server virtualization infrastructure is vital to your organizations long-term Cloud Infrastructure-as-a-Service (IaaS) success. Benchmarking will yield your IT organization the knowledge needed for solid planning, effective execution and post-migration performance validation.
  • Flash storage: A vendor-neutral way to analyze performance Jun 11 2014 6:00 pm UTC 45 mins
    Flash is the hottest technology in the storage industry today. But with all its touted advantages, there are some challenges – including how to effectively measure the performance benefits for your own environment.

    Although flash can be expensive, most of the flash-based storage arrays implement sophisticated compression, deduplication and pattern reduction processing to minimize the amount of data written to flash memory in order to lower the cost per GB and extend the life of flash memory.

    Effectively measuring the performance of flash arrays requires more than the basic freeware benchmarking tools and following the steps documented by the SNIA SSSI specification. It requires the need for specifying complex data patterns in these data reduction technologies. Measuring performance without taking these features into account could falsely overstate the performance of a flash array by a factor of 2 or more.

    Attend this presentation to learn how to best validate the performance of your potential flash storage arrays in order to optimize costs and mitigate risk.
  • How Cool is the Cloud? Exploring Your Data Center Cooling Options May 15 2014 6:00 pm UTC 45 mins
    All Data Centers, whether great or small, have one thing in common; they have a heat transfer (cooling) problem. Not even ten years ago, cooling problems were solved with the purchase and installation of another Computer Room Air Condition (CRAC). Today’s cooling methodologies are truly amazing, but can be very intrusive and expensive to implement. It seems that Data Center Managers ‘stuck’ with a ‘legacy’ data center have been given two options; either adopt the latest and greatest cooling methodologies or move your Information Technology (IT) to the cloud. In many cases today, the question may be “How do we keep the wheels on the donkey cart while we figure out how and when we go to the cloud?”

    Join Cask to understand issues such as:
    - Why your cooling solution may not be as pathetic as you think.
    - How Computational Fluid Dynamics (CFD) can help you understand how heat transfer works (or doesn’t work) in your data center.
    - What you can do to inexpensively update your cooling methodology.
  • Service Chaining and SDN: Delivering Secure and Accelerated Infrastructure May 15 2014 3:00 pm UTC 45 mins
    Legacy data center network architectures are typically static, inflexible and manually provisioned, making them unsuitable for the scale and agility required of a cloud business model. Emerging cloud delivery models incorporate automated service provisioning in a virtualized, multi-tenant environment to achieve scale and agility. Dynamic service chaining is a critical component in building an on-demand model for consumption of L4-L7 application network services. In this session we will cover how dynamic service chaining is integrated into the SDN and cloud orchestration platforms to deliver a highly available, secure and accelerated infrastructure.
  • Data Center Cooling: How to Measure & Improve Utilization May 14 2014 8:00 pm UTC 45 mins
    Study of data centers reveals the average computer room has cooling capacity that is nearly four times the IT heat load. When running cooling capacity is excessively over-implemented, then potentially large operating cost reductions are possible by turning off cooling units and/or reducing fan speeds for units with variable frequency drives (VFD). Using data from 45 sites reviewed by Upsite Technologies, this presentation will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
  • The Rise of The ServerSAN: Will converged storage kill off the disk array? May 14 2014 6:00 pm UTC 45 mins
    A new class of software defined storage ServerSAN solutions promise to bring to the staid world of storage the disruption, and efficiencies, that virtualization has brought to computing. ServerSANs, typified by VMware’s VSAN and hyperconvirged solutions from Simplivity and Nutanix use software, running under a hypervisor, to take SSDs and spinning disks into a common, high performance storage pool.

    Can ServerSANs replace the physical SANs and disk arrays the way virtual servers have replaced their physical counterparts or are ServerSANs a niche solution for remote offices and SMBs? Either way it’s clear this new technology should be in your storage solution bag of tricks.

    In this presentation we’ll explore the common elements ServerSAN solutions have and compare some of the leading solutions and their unique solutions to common problems like fault tolerance and data protection.
  • The Software-defined Datacenter in a Hyperconvergence World May 14 2014 4:00 pm UTC 45 mins
    In today's data centers, the need for flexibility and agility is undeniable. As businesses continue to grow and leverage technology to remain competitive, they require a new way of simplified IT. IT organizations can no longer deal with complex, cumbersome legacy infrastructure that can't keep at the pace of the business.

    In this webinar, discover:
    - What is hyper convergence
    - The benefits of converged infrastructure
    - Best practices and use cases for leveraging hyper converged architectures
  • Understanding the Promise of Software Defined Environments May 14 2014 2:00 pm UTC 45 mins
    The emergence of “the Cloud” has introduced unprecedented levels of automation and virtualization to the data center environment. The Cloud is now maturing to virtualize network functions along with the computing resources. Understanding orchestration is imperative for succeeding with Software Defined Networking and Network Function Virtualization

    Three Key Take-Aways:
    - What does the “Next Gen Datacenter” look like
    - Driving better service stability through DevOps
    - Leveraging Business Process Management to align with the business
  • Considerations for Ramping to a Big Data Network Monitoring Architecture, Part 2 May 7 2014 5:00 pm UTC 60 mins
    This is a continuation of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Big data techniques and technologies can be powerful tools for scaling network monitoring and forensics. They can also facilitate new use cases for network data, potentially beyond the scope of Operations.

    Gordon Beith, Director of Product Management at VSS Monitoring, will discuss practical considerations for migrating to a Big Data Visibility Architecture, including:
    • Accommodating network volume, velocity and variety using sophisticated hardware preprocessing and APIs
    • Metadata versus flow statistics versus full packet capture – considerations and use cases for each
    • Open versus proprietary formats for storage
    • Pros and cons of integrated capture/storage/analysis solutions versus separate capture/ storage solutions coupled with virtualized analysis probes
    • Addressing retrieval in an “open” forensics model
    • Leveraging a distributed computing framework for processing large-scale data stores
  • Hypervisor Convergence: What is it and can it save you money? May 1 2014 3:00 pm UTC 45 mins
    High availability has traditionally required virtualization and a SAN. Then came virtual storage appliances (VSAs) which were managed like a physical SAN but ran as a virtual machine. Now comes hypervisor convergence, the latest trend that eliminates the entire concept of a SAN, both physical or virtual. Is this hype? Or can this latest technology save you time and money? Let Scale Computing show you how HC3 can radically change your environment for the better.

    HC3 represents the cutting edge of infrastructure innovation: A highly available platform with the scalability of the cloud and the security of your own servers, coupled with a radical reduction in both upfront costs and TCO. No more VMware. No more SAN. No more headaches.
  • Leveraging a Big Data Model in the IT domain, Part 1 Apr 30 2014 5:00 pm UTC 60 mins
    This is part 1 of our 2-part series on Big Data Visibility with Network Packet Brokers (NPBs).

    Even as network data has exploded in volume, velocity and variety, network monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale and accommodate a widening virtualization trend. Customers are demanding greater freedom in how applications are deployed and are moving to a consolidated, shared model of data using big data frameworks, such as Hadoop, which enable large-scale processing and retrieval for multiple stakeholders.

    Join Andrew R. Harding, VP of Product Line Management at VSS Monitoring, as he discusses:
    - Big data and its implications for network monitoring and forensics
    - Why network monitoring solutions are lagging from a virtualization standpoint and why this is a problem for network owners
    - How certain traditional network monitoring functions will eventually be offloaded to adjacent technologies
    - How Network Packet Brokers can accelerate the adoption of virtualized probes, “open” storage, and big data technologies within network management / monitoring
    • How a Big Data Visibility architecture can enable network data to become part of the “big data store,” allowing it to integrate with the rest of enterprise data
  • Top 5 Ways for IT to Improve Database Performance Apr 30 2014 5:00 pm UTC 30 mins
    The performance of databases often slows as data and business grows, users find new and demanding ways to leverage applications, and those applications mature and expand in functionality. Whenever a key database slows down, SQL or NoSQL, the business damage can be widespread and it usually becomes a high priority effort to remediate.

    At Taneja Group we’ve noted 5 major ways that IT operations can improve database performance, including a couple of quick and ready ideas that impose little risk or cost. In this 30 minute webcast, we'll look at why IT operations often gets the responsibility for database performance, and the IT-centric options they can pursue.

    Mike Matchett brings to Taneja Group over 20 years experience in managing and marketing IT datacenter solutions particularly at the nexus of performance, capacity and virtualization. Currently he is focused on IT optimization for virtualization and convergence across servers, storage and networks, especially to handle the requirements of mission-critical applications, Big Data analysis, and the next generation data center. Mike has a deep understanding of systems management, IT operations, and solutions marketing to help drive architecture, messaging, and positioning initiatives.
  • OpenStack & Optimized Hardware: Avoid Problems That Can Stop Deployment Apr 30 2014 4:00 pm UTC 60 mins
    Frictionless access to information makes everyone think they can do this at home. But, in fact, deploying OpenStack on optimized hardware hardware presents a hatful of challenges that your infrastructure team might not have thought about.

    In this session, we'll look at a range of challenges that can stop your project before it makes it to deployment. The session is divided into two topics that we’ll dive into:

    (a) Introduction to scalability techniques: clouds from a hardware perspective.
    Building a large cloud is more than just throwing hardware into a hall and lighting it up. Network, storage, compute and scaling strategies must be designed in from the beginning. In the current state of the art of OpenStack, some decisions are easy to unwind later on and some are impossible. This portion of the presentation will focus on describing the steps you need to execute to build a successful cloud and which decisions you can push off to later.

    (b) The second section of the session will focus on strategies to simplify the optimized hardware experience. If you’re assembling racks on onsite, you need a plan to deal with everything from cabling and airflow to the NIC firmware and drivers. Each of these details can delay your project and run up costs. We’ll also look at the trend toward scalable rack-level units that are factory integrated and tested.

    Attendees will also learn about some of the simple things that are obvious with enterprise hardware but can be challenging in any optimized hardware environment. Examples include power on/off, power monitoring, system health/event monitoring, remote console access.

    You'll leave this session armed with practical knowledge about running OpenStack on Open Compute and other optimized hardware hardware.
  • BYOD Challenges, Recommendations & Best Practices from Box Apr 24 2014 3:00 pm UTC 60 mins
    85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • The New IT - How the World of Work is Changing and What IT Needs to Do to Adapt Recorded: Apr 23 2014 60 mins
    The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • How to accelerate your SaaS development using PaaS Recorded: Apr 23 2014 44 mins
    As more and more software product companies are looking to migrate their traditional on-premise software to a Software as a Service (SaaS) offering they are discovering it takes longer than first expected and comes with many challenges.

    Platform as a Service (PaaS) provides a great way to create highly scalable applications. PaaS accelerates application development, testing, deployment and maintenance of your SaaS application.

    Join Mark Eisenberg, a thought leader in cloud and mobile, and Motifworks’ Nitin Agarwal to learn how to accelerate your migration to SaaS using PaaS. This webinar will feature a review of the Windows Azure PaaS platform and Motifworks SaaS development framework to further reduce your time-to-market.

    Attendees will learn:
    * The benefits of Platform as a Service over Infrastructure as a Service (IaaS)
    * How PaaS accelerates development and delivery of SaaS
    * Azure Cloud Services (PaaS) overview
    * Best practices for great cloud application on Azure PaaS
  • The Open SDN Stack Recorded: Apr 17 2014 44 mins
    Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • OpenStack Icehouse Release Update Recorded: Apr 17 2014 44 mins
    Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • SDN, NFV, and the Cloud Disruption: The Next Generation ODIN Recorded: Apr 17 2014 41 mins
    The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • Make Your Storage Work for Your Big Data Project Recorded: Apr 16 2014 30 mins
    Big Data projects do not always require new storage. In fact, the best Big Data projects can leverage existing storage solutions. This presentation will look at how you can make your existing storage work for Big Data.
best practices for achieving enterprise IT efficiency
The Enterprise Architecture channel presents the next generation of enterprise IT: recognizing the strategic importance of the data center to make companies more nimble and competitive. These presentations will help demanding IT professionals achieve flexibility, scalability and performance with reduced risk and complexity.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Adobe Acrobat X: Reduce Risk and Protect Documents
  • Live at: Jun 28 2012 5:00 pm
  • Presented by: Rick Borstein, Senior Solutions Consultant, Adobe & Mark Middleton, Business Development Manager, Adobe
  • From:
Your email has been sent.
or close
You must be logged in to email this