Hi [[ session.user.profile.firstName ]]

Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint

Do you know the "4 Must Haves" in virtualization security designed to help large organizations understand the challenges of securing virtualized environments? Gain insights into the rapidly-evolving virtualization security landscape, compliance mandates, and understand a comprehensive offe
Do you know the "4 Must Haves" in virtualization security designed to help large organizations understand the challenges of securing virtualized environments? Gain insights into the rapidly-evolving virtualization security landscape, compliance mandates, and understand a comprehensive offering by McAfee, Intel, and HyTrust that can help you scale your VMware infrastructure while staying compliant and secure.

Underpinned by Intel TXT for safe boot, and integrated with McAfee security management, HyTrust Appliance is a suite of management applications designed to protect administrative error and abuse. Join HyTrust and McAfee to learn about virtualization optimized solutions covering:

• Access Control and Account Management
• SIEM and Log Management
• Network and Endpoint Security
• Configuration Management and Hardening
Recorded Dec 18 2012 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and HyTrust
Presentation preview: Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint
Recommended for you:
  • Date
  • Rating
  • Views
  • IBM Government Analytics Forum Livestream IBM Government Analytics Forum Livestream IBM Live 560 mins
    Wherever you are in the mission space – IT, development, program management, research or analysis – we all have one thing in common: We strive to meet mission outcomes that will transform and improve government services. But in a world of exponential change, federal agencies must continue to be innovative, agile and informed in order to make the best possible decisions to achieve results.

    Analyzing and understanding data allows federal agencies to generate predictive insights that lead to impactful actions and ultimately create a smart, efficient and highly-capable government. At the 2016 Government Analytics Forum, we’ll explore ways to:

    - Build a better understanding of the data acquired anywhere from social interactions to sensors, weather patterns to wearables, transactions to interactions and more
    - Develop informed decisions that drive mission performance and innovation in the areas of citizen programming, operational management, and threat mitigation
    - Expand and apply advanced analytics to enhance mission outcomes, reduce risks, and operate more efficiently
  • Assumption of Attack Webinars series #5: Central Management (Italian) Assumption of Attack Webinars series #5: Central Management (Italian) Alberto Malerba, Senior Sales Engineer, Trend Micro. Recorded: May 5 2016 15 mins
    Il 18 febbraio abbiamo lanciato la nostra serie di webinar dal titolo Assumption of Attack e abbiamo parlato di come le Smart Protection Suite ti assicurano una protezione completa e avanzata che costituisce uno scudo protettivo estremamente difficile da penetrare per i criminali informatici.

    Il nostro quinto webinar guarderà dietro la porta n. 5, Gestione centralizzata. Come puoi riuscire a gestire a livello centrale i criteri su minacce e dati per tutta l’infrastruttura IT? Quali sono i vantaggi di una visibilità utente-centrica in tutto il tuo ambiente?
  • Assumption of Attack Webinars series #5: Central Management (German) Assumption of Attack Webinars series #5: Central Management (German) Torsten Westphal , Senior Sales Engineer, Trend Micro. Recorded: May 5 2016 23 mins
    Am 18. Februar haben wir unsere Webinar-Serie namens „Assumption of Attack“ gestartet und erläutert, wie Ihnen die Smart Protection Suite umfassenden und fortschrittlichen Schutz bietet. Es entsteht ein Schutzschild, das von Cyberkriminellen nur äußerst schwer zu überwinden ist.

    In unserem fünften Webinar werfen wir einen Blick hinter Tür 5, Zentrale Verwaltung. Wie können Sie Bedrohungs- und Datenrichtlinien zentral für Ihre IT-Infrastruktur verwalten? Welche Vorteile bietet eine anwenderzentrierte Transparenz in Ihrer Umgebung?
  • Dridex: The Financial Threat Clogging Our Mailboxes Dridex: The Financial Threat Clogging Our Mailboxes Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec Recorded: May 5 2016 31 mins
    Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

    Join this webcast as we discuss:

    •Dridex propagation methods, in particular its massive spam campaigns.
    •How Dridex attempts to steal banking information.
    •Guidance on how to protect against Dridex infections

    (This webinar is sponsored and brought to you by Symantec.)
  • Meeting international requirements and leveraging CSA STAR for supply chain mana Meeting international requirements and leveraging CSA STAR for supply chain mana John DiMaria, BSI Recorded: May 4 2016 52 mins
    When an organization adopts cloud services, it is in fact expanding its operations from a local or regional presence to a more global one. As a result, the corresponding organizational operations’ strategy needs to be adjusted to align with these changes. You need to be in line with international requirements as well as your supply-chain. A more formal analysis of the supply-chain as part of a more comprehensive due diligence review also needs to be considered.1

    It is not always clear how the CSP handles incidents, encryption, and security monitoring. Organizations are rarely aware of all the risks they take when working with a CSP. In fact, the risks are multifaceted and are far more complex than those they experienced before moving to the cloud.

    An organization that rushes to adopt cloud services may subject itself to a number of business impacts including

    - Contractual issues over obligations regarding liability, response, and/or transparency
    - Mismatched expectations between the CSP and the customer
    - Lack of internal training and awareness within the user organization
    - Potential for software designers/engineers that are developing software to be unaware of associated risks

    Many organizations are turning to the cloud because of the resources required to manage complex supply chains. It can be challenging for most organizations to understand the supply-chain structure of the CSP’s environment; however, an increase in transparency will increase trust.

    At this session we will discuss:

    -Quick review of module 1
    -How CSA STAR maps to international requirements
    -How you can use CSA STAR to manage and monitor your supply-chain.
  • HPE and Hortonworks Partner to Transform Manufacturing Operations HPE and Hortonworks Partner to Transform Manufacturing Operations HPE, Hortonworks Recorded: May 4 2016 62 mins
    Optimizing manufacturing processes ultimately revolves around increasing output at reduced cost and improved quality. Manufacturers try to minimize inventory levels by scheduling just-in-time delivery of raw materials, but even the smallest miscalculation can cause stock-outs that lead to production delays. Sensors and RFID tags can capture supply chain data, but this creates a large, ongoing flow of data. Hadoop can cost-effectively store this unstructured data, providing manufacturers with greater visibility into their supply chain history, and greater insight into longer term supply chain patterns. This gives manufacturers more lead time to adjust to supply chain disruptions, as well as helps reduce costs and improve margins on finished products.

    Hewlett Packard Enterprise and Hortonworks have a strategic partnership to help manufacturers realize their modern data architecture. Join us for this webinar and learn how Hortonworks leading enterprise-ready open data platform in combination with HPE’s leadership position in the worldwide x86 server market provides manufacturing organizations with proven solutions to help transform manufacturing processes.
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • Pulse Policy Secure - Enabling Secure Mobility Pulse Policy Secure - Enabling Secure Mobility Lisa Lorenzin, Principal Solutions Architect Recorded: May 4 2016 28 mins
    Join us on Wednesday, May 4 at 8am PST to dive deep into enabling enterprises to balance business security with user productivity using BYOD.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint
  • Live at: Dec 18 2012 6:00 pm
  • Presented by: McAfee and HyTrust
  • From:
Your email has been sent.
or close
You must be logged in to email this