Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secure RDP Connections with Leostream Karen Gondoly, CEO, Leostream Security is key for users connecting remotely through RDP. Leostream helps you make sure only authorized users have access and that the connection its... 8 months ago | 25 mins How Rapid Automation Can Help Streamline SBA PPP Loan Applications & Forgiveness Bruce Mazza & Lou Bachenheimer (Blue Prism), Julie Balerna (ABBYY), Rachel Brennan (Bizagi), Pawan Jadhav (Lateetud) The passage of the Coronavirus Aid, Relief, and Economic Security (CARES) Act in the U.S. has prompted thousands to seek relief from financial uncerta... 2 years ago | 52 mins Bring Your Own Encryption Strategies for a Multi-Cloud World Charles Goldberg, Vice President of Data Protection Product Marketing, Thales The 2020 Thales Data Threat Report found that 100% of surveyed organizations have sensitive data in the cloud and 57% of it is encrypted. In addition... 2 years ago | 57 mins Transform IT with Blended Desktop Virtualization Delivery Matt Evans, Senior Systems Consultant, Desktop Virtualization Group, Quest Software Your organizations workforce is diverse – some users are completely office based, others are constantly mobile and many are in between. These users h... 11 years ago | 48 mins Enterprise Security in Data Access Jim Silhavy, Manager of Software Engineering, Progress Get up-to-speed on the latest security advances for cloud, big data and relational databases. In the wake of increasingly frequent data breaches and ... 5 years ago | 46 mins When to Use Provider Encryption, Bring Your Own Key & BYOE for Public Clouds Charles Goldberg, VP of Data Protection Product Marketing, Thales The 2020 Thales Data Threat Report found that 100% of surveyed organizations have sensitive data in the cloud and 57% of it is encrypted. That is a l... 2 years ago | 63 mins Authorizing changes, who are the right people? Ken Goff, Service Desk Institute, Senior Consultant Who authorizes changes? Is it management or IT employees? Ken Goff will be conducting a discussion with audience members. 12 years ago | 47 mins Creating Value in Every Sales Call Michael Pici, Brian Burns, Jeffrey Lipsius, Lisa Dennis, Moderator: Deb Calvert Are you creating value in every sales call? Value that differentiates you and makes you relevant for every prospect? Value creation drives sales, and ... 5 years ago | 49 mins SDP – The Yellow Brick Road to Zero Trust Juanita Koilpillai Founder and CEO Waverley Labs LLC Today’s network security architectures, tools and platforms fall short of meeting the challenges presented by current security threats. Zero Trust is ... 2 years ago | 43 mins FICO Webinar: How to Fight Fraud from Scams James Roche Senior Consultant, FICO The COVID-19 crisis has been exploited by fraudsters, skyrocketing the number of attacks perpetrated. Scams have cost banks more than €24 billion over... 2 years ago | 51 mins Load more