Hi [[ session.user.profile.firstName ]]
Sort by:
    • Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager Upcoming: May 24 2016 5:00 pm UTC 60 mins
    • The proliferation of devices in the workplace has increased the demand on organizations to enable secure mobile access to company applications, data and resources.

      They need to ensure only authorized users and approved devices that meet security policy are granted network and resource access and that company data in-flight and at rest on the device is secure.

      Dell SonicWALL’s Secure Mobile Access (SMA) solution provides mobile and remote workers using smart phones, tablets or laptops with policy-enforced access to mission-critical applications, data and resources without compromising security.

      This allows user administrators to quickly and easily provision secure mobile access and role-based privileges so end-users get fast, simple access to the enterprise applications, data and resources they require.

      Join us to hear how SMA 1000 series 11.4 brings greater enhanced functionality, such as:
      - Global Traffic Optimizer (GTO)
      - Regulatory Compliance
      - Management API
      - Enhanced SAML 2.0 support

      Read more >
    • Survival Guide for SharePoint: Part 4 – Automating SharePoint Services Survival Guide for SharePoint: Part 4 – Automating SharePoint Services Edmund White Recorded: Sep 9 2015 6:00 pm UTC 59 mins
    • Our SURVIVAL GUIDE webinar series has taught you how to FIX all of your problems and to make sure that your changes and policies are ENFORCED.

      Now it’s time to make your life easier AUTOMATING the repetitive and time-consuming processes involved with managing your SharePoint deployments.

      Sounds great, right? But what does that mean? How would you like to:
      * Get end users the resources they need quickly by providing clear direction about what services are available and how to use them?
      * Offer an out-of-the-box service catalog for your users to choose from?
      * Fulfill requests for provisioning, administration, security, content and lifecycle management changes without having to burden IT?
      * Automatically tag, classify, and apply retention policies from the creation of documents to full site collections?

      Register now to join AvePoint Field Product Manager Edmund White, as he shows you how our SURVIVE GUIDE can automate the steps involved in configuring, managing, and enforcing SharePoint governance and compliance policies.

      Don’t JUST SURVIVE, be a force for change and get back to focusing on more strategic, higher-value operations.

      Read more >
    • Adapting Your Risk Management Framework for New Regulations Adapting Your Risk Management Framework for New Regulations Lillibett Machado, MBA, CISA, CISM, CGEIT, CRISC, ITIL-BSM Recorded: Oct 22 2014 3:30 pm UTC 60 mins
    • Cadence Bank recently established the Technology & Operations Governance and Risk Management under the Enterprise Risk Management function reporting to the Board of Directors of the bank. On a recent regulatory audit, the ERM team was recognized for achieving a workable governance framework and integrating the Technology Governance and Risk Management, using Modulo’s GRC automation software as the technology to help execute all our risk and compliance assessments. GRC automation software facilitated Cadence Bank’s objective of achieving the implementation of the new regulatory requirement of the “Three Levels of Defense” being enforced by the regulatory agencies.

      Learn how in this case study, as Cadence Bank’s CISO Lillibett Machado discusses ways to develop a technology GRC framework and use automation to facilitate the new functions required for the CISO’s responsibilities within GRC.

      Read more >
    • The Power of Policy The Power of Policy Dave Ewart, Senior Director Product Marketing Recorded: Jun 25 2014 4:00 pm UTC 40 mins
    • Today’s business is made up of two opposing forces; closed policies enforced by IT and governance, and the open connectivity and mobility that users require.

      Join our webinar ‘The Power of Policy’ as we uncover key drivers for policy implementation and discuss new thinking and technologies for securing collaboration and file sharing.

      Attend to learn:

      • The legal requirements, user needs, and risk that drive policy enforcement
      • The required capabilities to facilitate compliance, risk mitigation, and data leakage prevention
      • Best practice and real world examples for harmonizing the need for policy with the need for mobility

      Read more >
    • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Protecting Your Sensitive Data Does Not Have to Impact Business Operations Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security Recorded: Sep 17 2014 3:30 pm UTC 61 mins
    • Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
      Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.

      Read more >
    • Understanding the Need for XML and Structured Content Understanding the Need for XML and Structured Content Sarah O’Keefe, Scriptorium Publishing; George Bina, SyncRO Soft / oXygen XML Recorded: Oct 6 2014 5:00 pm UTC 60 mins
    • Structured authoring is a publishing workflow that lets you define and enforce consistent organization of information in documents, whether printed or online. In traditional publishing, content rules are captured in a style guide and enforced by (human) editors, who read the information and verify that it conforms to the approved style. In structured authoring, a file—either a document type definition (DTD) or a schema—captures these content rules. Authors work in software that validates their documents; the software verifies that the documents they create conform to the rules in the definition file.

      Structured authoring and XML represent a significant paradigm shift in content creation. Implementing structured authoring with XML allows organizations to enforce content organization requirements. The addition of hierarchy and metadata to content improves reuse and content management. These benefits, however, must be weighed against the effort required to implement a structured authoring approach.

      In this free, one-hour webinar, Scott Abel, The Content Wrangler, welcomes XML publishing expert, Sarah O’Keefe (Scriptorium Publishing), who will demystify structured XML authoring and explore the value of using XML to produce technical content. Sarah will be joined by George Bina of Oxygen XML who will be on hand to answer technical questions about the Oxygen XML Authoring tool.

      One lucky attendee will win a free pass to the Information Development World Conference, October 22-24 in San Jose, CA. And, ten registrants will be selected to receive a free copy of the book “The Language of Content Strategy” (2014, XML Press).

      Read more >
    • Energy & Sustainability - reducing operating costs & boosting profit margins Energy & Sustainability - reducing operating costs & boosting profit margins Mark Staples Recorded: Apr 2 2014 9:00 am UTC 61 mins
    • Energy and Sustainability Management in the Food and Beverage environment, reducing your Operating Costs, to Boost your Profit Margins.

      Compared to other industries, the Food and Beverage (F&B) industry leads the way in terms of the development and deployment of sustainability programmes. F&B manufacturers have improved the efficiency of their facilities, invested in renewable energy, and managed the sustainability of their supply chains in order to lower the impact on the environment. The F&B industry has met the requirements of global and local legislation, and leads all sectors in sustainability disclosure.

      However, with persistent global resource shortages and increasing energy and commodity prices, tougher governmental regulations will be enforced and customers will demand increased transparency of F&B operations. It is estimated that 10% of the world’s emissions come from manufacturing, and that a 26% improvement potential exists for manufacturing firms worldwide.

      This Webinar, recommends an integrated Sustainability and Energy Management programme resulting in reduced costs, increased profitability, lower carbon emissions, mitigated risk and improved corporate image for F&B organisations.

      Read more >
    • Contain Yourself - Analysis of BYOD Secure Containers Contain Yourself - Analysis of BYOD Secure Containers Ron Gutierrez, Security Consultant for Gotham Digital Science Recorded: May 13 2014 5:00 pm UTC 51 mins
    • In today's world, everyone wants access to information from his or her personal mobile device. As a business, this includes your customers and/or employees. What if the information they want access to is highly sensitive? While it's tempting to resist these pressures for security reasons, providing mobile access can be a significant competitive advantage and most importantly keep your customers and employees happy and productive. The reality is that in order to survive in a connected world, we must provide a way to meet these demands without sacrificing security.

      Organizations have begun moving from "managed devices" to a Bring Your Own Device (BYOD) model where company resources can be accessed and stored on unmanaged devices. As you can imagine, there are some inherent risks with this approach due to the organizations inability to enforce policies on personal devices. There is currently a huge market for solutions that allowing enterprises protect their data on unmanaged devices. Enter "Secure Containers” and “Application Wrapping". The basic premise of these solutions is that it allows organizations enforce policies at the application layer rather than the device layer. For example, authentication, remote wipes, lockouts and data encryption can now be enforced on a per application basis. Application Wrapping is a technique, which allows the ability inject their own code into existing iOS applications. Once injected, existing iOS method implementations can be overwritten to enforce these policies. In a nutshell, you can have an existing application and have it wrapped so that it enforces various defined policies and secure it without developers having to manually implement it.

      Read more >
    • Lessons Learned From the Target Data Breach Lessons Learned From the Target Data Breach Brandon Dunlap, Brightfly; Terence Spies, Voltage Security; Chris Merritt, Lumension; Matt Getzelman, Coalfire Recorded: Mar 18 2014 6:00 pm UTC 60 mins
    • *On this webcast we're giving away a non-transferable guest pass to the IQPC 2nd Annual Cyber Security for Oil and Gas Summit, being held in Houston, Texas between June 16 - 18, 2014.

      In December 2013, US retailer Target suffered a high profile data breach at the hands of a cybercriminal group, who infected its point-of-sale (PoS) terminals with malware to steal the details of around 110 million customers. Marcus Group's systems were also compromised recently and crooks made off with customer card details, while several other merchants are reported to be preparing to go public with their own breaches.

      Data breaches are nothing new and have been around for quite some time; however, we are seeing a significant increase in incidents and 2013 was the worst year in terms of data breaches recorded to date. According to the Online Trust Alliance over 740 million records were exposed in 2013, and they determined that 89% of all breach incidents were avoidable had basic security controls and best practices been enforced. Join us as we discuss some key lessons learned from the recent breaches and:

      - Discuss how malware aimed at retailers is evolving on a daily basis
      - Analyze the tools and methodology employed hackers to bypass security
      - Address steps retailers and banking institutions should take to secure their networks
      - Provide procedural and technical steps for securing third party code
      - Discuss how to develop an effective Data Incident (DIP) Plan, including a communication strategy

      Read more >
    • Emerging Risk: Heading off Regulatory Scrutiny on Residential Appraisals Emerging Risk: Heading off Regulatory Scrutiny on Residential Appraisals Jack Huntress, EDR, Liz Green, REL-E-VANT SOLUTIONS, Larry Schnapf, Schnapf LLC Recorded: Jul 17 2013 6:00 pm UTC 75 mins
    • For lenders operating in the shadow of the Dodd-Frank Act, CFPB and other regulatory enforcement agencies are focusing their efforts on consumer protection, disclosure and transparency and deem these critical to all areas of an institution’s compliance and operation. A dizzying array of new rules and regulations, often disruptive to existing operations, are raining down upon the mortgage lending industry. Now, however, it’s not enough to simply be aware of emerging rules and regulations. Little known requirements and regulations which have been on the books for years without being enforced are now getting renewed attention from those agencies, likely opening up an entirely new front in the uphill battle to stay compliant. One of the greatest potential risks to lenders arises from requirements for residential property appraisals and evaluations. It is likely we will see stricter environmental underwriting and more regulatory scrutiny on lenders’ risk management policies. Discover now where lenders are most at risk, and learn about cost-effective measures that can be taken to stay out of the regulatory crosshairs.

      The presenters will:

      • Identify existing rules and regulations, little-known and long unenforced, that are likely to be revitalized by regulatory enforcers;
      • Spell out the specific risks that residential property contamination, including vapor mitigation, will pose to a mortgage lender;
      • Explain how the gamut of new and existing requirements will impact traditional due diligence requirements; and
      • Predict the possible financial impact upon lenders, as well as offering potential solutions for risk mitigation.

      Read more >
    • Best Practices for a Secure Mobile App Ecosystem Best Practices for a Secure Mobile App Ecosystem Benjamin Robbins, Principal of Palador Inc Recorded: May 24 2012 6:00 pm UTC 27 mins
    • Enterprises are increasingly turning to cloud services as an integral part of fulfilling their mobile strategy. Cloud services offer stability, scale and function beyond the capabilities of many organizations’ on-premise infrastructure. But relying on the public cloud has many IT administrators wondering - is it secure enough for my corporate data? Join Benjamin Robbins May 24 to learn best practices for building your mobile app ecosystem securely using public cloud services. Learn what security features are must-haves and how to identify vendors that comply. We’ll also discuss how to assure security policies can be managed and enforced for your anytime, anywhere workforce.

      Read more >
    • Virtualization and the Cloud: Encryption Enables a Fast and Secure Migration Virtualization and the Cloud: Encryption Enables a Fast and Secure Migration Gargi Mitra Keeling, Group Product Manager, vCloud Security, VMware; Imam Sheikh, Product Manager, Virtualization, SafeNet Recorded: Oct 18 2012 3:00 pm UTC 47 mins
    • The business benefits and economies of migrating to virtualized and cloud environments are very clear, providing significant cost reduction and system efficiencies, moving to a “pay as you go model”. However, when you move to a dense virtual infrastructure or cloud, you often lose control of the underlying infrastructure, therefore ownership and control of data in that infrastructure. In addition, workloads are mobile yet security is usually tied to underlying infrastructure, removing any assurances that security policies can be enforced as workloads move.

      In the journey to virtualization and the cloud, many organizations are still contending with large pools of physical infrastructure. They want to gain the efficiency and lower cost associated with server consolidation and virtualization, but security and audit teams advise them this puts the company’s sensitive data at risk. Automating IT in a private cloud keeps developers and other users in-house and under an organization’s control, but rapid deployment of workload requires agile security.

      Join your fellow professionals to first understand the challenges and roadblocks of migrating to the cloud and virtualized environments, and where the data security gaps exist. Then understand how by attaching security to the data itself and managing the encryption keys, you are able to maintain control of your data, prove compliance, and facilitate governance – even in a dense virtual or cloud environment. Virtualization, Hybrid or Public cloud offerings can now be used for broader workloads (including ones containing business critical, sensitive data ie. production servers in addition to test and development), while still delivering the security and compliance requirements needed.

      Read more >