Hi [[ session.user.profile.firstName ]]
Sort by:
    • Reduce Security Vulnerabilities in Enterprise Applications
      Reduce Security Vulnerabilities in Enterprise Applications Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Aug 17 2017 11:00 am UTC 61 mins
    • Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats

      Read more >
    • Best Practices for Consolidated Billing & Tagging to Reduce Multi-Account Costs
      Best Practices for Consolidated Billing & Tagging to Reduce Multi-Account Costs Dave DeYager, CloudCheckr Support & Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 10 2017 6:00 pm UTC 36 mins
    • Amazon Web Services (AWS) provides organizations with the option of consolidated billing, to unify data from separate accounts under one centralized payer account. Consolidated billing enables simplified operations for large organizations, while increasing the possibility of volume discounts.

      However, with consolidation comes the responsibility of allocation; organizations with multiple accounts—departments, projects, customers, etc.—are faced with the challenge of enforcing accountability. For internal teams, budget allocation and forecasting can be a struggle; for Managed Service Providers, chargebacks and invoicing can be a nightmare.

      The CloudCheckr platform offers tagging to help user manage their instances, images, and EC2 resources. In this webcast, learn how to leverage consolidated billing and tagging to improve efficiencies and reduce cloud costs. Attendees will learn:

      - How consolidated billing helps to improve governance and save on volume purchasing for multiple cloud accounts
      - Why tagging is critical to managing budgets, allocating costs, and enabling chargebacks
      - What to consider when creating a tagging strategy
      - How CloudCheckr helps automate billing processes across accounts

      Read more >
    • Targeted ABM Strategies: Increase Conversions and Reduce Sales Cycles
      Targeted ABM Strategies: Increase Conversions and Reduce Sales Cycles Val-Pierre Genton, VP of Audience at BrightTALK Recorded: Jun 14 2017 9:00 pm UTC 39 mins
    • As marketers are being asked to increase their contribution to bookings and revenue, account-based marketing is being used as a strategy to improve conversions and reduce the sales cycle.

      That said, ABM is only as good as the quality of the underlying data in your database and performance varies substantially depending your approach to execution.

      Tune in to this session and learn how you can:
      - Increase the number of target accounts
      - Increase the number of contacts inside of target accounts
      - Increase appointments with target accounts
      - Improve sales and marketing alignment
      - Grow revenue inside target accounts

      Over the past 17 years, Val has built and sold an Internet business and helped business, sales and marketing executives at Fortune 500, mid market and start-up companies to create value, move markets and accelerate growth. He combines this knowledge with deep insights from millions of data points that are generated as nearly 6M professionals connect with experts and companies on BrightTALK to learn and grow.

      Read more >
    • Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources
      Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Chris Martin, LogRhythm Security Expert Recorded: May 17 2017 12:00 am UTC 49 mins
    • Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      •The definition and details of the TLM framework
      •How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      •How TLM works to streamline processes through automated workflow
      •Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com
      Stop Fraud Instantly & Reduce CNP Fraud Loss by 25% - hosted by PYMNTS.com James Rendell, VP Payment Security, CA; Paul Dulany, VP Data Science, CA; Karen Webster, CEO MPD Recorded: May 25 2017 2:00 pm UTC 59 mins
    • Too often card issuing banks suffer significant loss from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from multiple issuers to complete purchases from a single device before the stolen cards can be blocked. The goal is to immediately identify and stop fraudulent transactions, while maintaining a frictionless shopping experience.

      CA Risk Analytics Network (CA RAN) is a unique, e-commerce fraud risk evaluation solution that stops fraud instantly and helps banks cut card-not-present (CNP) fraud losses by 25% and increase fraud detection by 20% (1, 2).

      Please join this exclusive briefing to learn more about CA RAN and how it can help:
      • Tap into the largest network of global cardholders and transaction data, gathered by CA’s industry-leading CA Payment Security Suite
      • Stop fraud immediately with real-time learning and instant risk score updates, based on behavioral analytics
      • Boost top-line revenue, while improved fraud detection reduces potential losses for better bottom-line results

      1. CA data science simulation on 50 CA Payment Security Suite customers.
      2. Results dependent on issuer-defined operational thresholds over a single issuer mode.

      Read more >
    • Reduce time to detect and respond to cyber threats - without adding resources
      Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Apr 26 2017 9:00 am UTC 48 mins
    • Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      • The definition and details of the TLM framework
      • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      • How TLM works to streamline processes through automated workflow
      • Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • Simplify File Storage and Reduce Cost with Cloud NAS
      Simplify File Storage and Reduce Cost with Cloud NAS Fred Pinkett, Senior Director Product Marketing at Nasuni Recorded: Aug 12 2015 5:00 pm UTC 49 mins
    • The growth of unstructured data, especially files, continues unabated and strains enterprise infrastructure. The problem isn't just storage of growing data, but backing it up, making it available with high performance for users in distributed offices and for mobile users - all while providing for disaster recovery. These challenges wreak havoc on staff and budgets. It’s time for a new approach to NAS that takes advantage of the cloud, while still providing local access, performance and security.

      Learn about this new generation of bottom-less, backup-less NAS that makes files accessible anywhere. Cloud NAS solves the challenges of file data storage, costs less to own and manage, and ends the cycle of NAS hardware refreshes forever.

      Read more >
    • Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources
      Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Chris Martin, LogRhythm Security Expert Recorded: Feb 23 2017 5:00 pm UTC 48 mins
    • Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.

      The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

      In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

      You’ll learn:

      •The definition and details of the TLM framework
      •How TLM enables you to sort through the noise to highlight and investigate concerning incidents
      •How TLM works to streamline processes through automated workflow
      •Specific use cases TLM can address to prevent major data breaches

      Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).

      Read more >
    • Use your data to Reduce Service Request Resolution Time
      Use your data to Reduce Service Request Resolution Time Dean Williams, President Block64 Recorded: Dec 7 2016 4:00 pm UTC 41 mins
    • Case study examples of using better asset data to improve service, reduce cost & mitigate risk.

      Smash the silo: make your key asset data available across the organization, at all times. In this section, we’ll talk a bit about how organizations often silo their support/ticketing systems off from other systems containing key asset data, and why this would matter and introduce potential waste and headaches for an organization.

      The hidden costs of a long refresh cycle: Here I discuss the relationship between aged assets and the spike this can cause in support traffic. A look at gaps that can be exposed by having things like asset age, supportability, and current maintenance coverage can help with a refresh strategy.

      Proper maintenance coverage: a shortcut to eased support overhead.
      Here I’ll talk through a handful of real-world examples where a lack of asset oversight led to actual outages or over-payment by customers we’ve worked with.

      Pitfalls of popular maintenance platforms: Discussing some of the ways in which gaps that cause support headaches are systemically introduced by popular maintenance programs such as SmartNET.

      Using data to reduce Service Request Resolution Time: Lastly, talk about how to gauge and meter the soft and hard benefits of introducing better data during the support process

      Read more >