Hi [[ session.user.profile.firstName ]]

Securing your IT Infrastructure: Vigilance is the Watchword

The role of an IT administrator does not end when the network is set up and the necessary security measures are in place. The ongoing health and security of the network is also dependent on the business satisfying a number of laws and regulations which the IT administrator must be aware of. Furthermore, the admin must also monitor the network continuously for faults as well as suspicious/malicious activity.

In this webcast we will show you how to use log data analysis and other techniques to proactively address hardware faults, malicious intrusions and other unwelcomed issues in real time. As a result, you can avoid having to react after the incident has occurred when, often, the damage has already been done.
Recorded Aug 29 2013 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
Presentation preview: Securing your IT Infrastructure: Vigilance is the Watchword

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beware of the Wild Wild Web Recorded: Mar 27 2014 38 mins
    Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant and Joshua Daggs, Sales engineer
    The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by preventing employees from accessing malicious sites in the first place. Deploying web filtering and enforcing an Internet access policy is the way forward.

    This webcast discusses the dangers of the wild wild web, and explains how common sense and an Internet policy, backed up by an automated web security management tool such as GFI WebMonitor®, can help your business to make the most of what the Internet has to offer, yet without the dangers.
  • GFI WirelessSentry – Wireless Networks Made Easy Recorded: Mar 19 2014 24 mins
    Sara Foley, Product Manager, GFI WirelessSentry and Joe Kern, Global Product Management, GFI Software
    This product introduction will highlight the exciting features of the latest addition to the GFI Software™ family of products – GFI WirelessSentry™ (we call it GFI WiSe™ for short).

    GFI WiSe provides IT administrators greater freedom and flexibility to monitor, manage and secure their wireless networks. By attending this training session you’ll learn how GFI WiSe will help improve wireless network deployments.

    GFI WiSe enables you to:

    • Monitor wireless activity and bandwidth utilization
    • Manage your existing hardware without purchasing new access points
    • Secure your users and protect business intelligence from wireless threats
  • Network security begins with patch management Recorded: Jan 28 2014 44 mins
    Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
    Zero day threats, undiscovered vulnerabilities, data leakage and intrusions are all terms no network manager ever wants to hear, especially when those intrusions are caused by faulty software or bugs. Join this webcast to find out how automation of patching can make these worries all things of the past.
  • Search term monitoring – A solution to a security issue you might be ignoring Recorded: Oct 31 2013 34 mins
    Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
    While many have come to appreciate the power of modern search engines, such as Google or Bing, there is a threat presented by unfettered searching - one that can compromise security, violate policies and confound compliance requirements.

    Dealing with that threat has become a major chore for today's network security personnel, nevertheless, many of the tools on the market leave much to be desired.

    Join this informative webcast and learn about that threat and how to deal with it.
  • Securing your IT Infrastructure: Managing security solutions in a complex world Recorded: Sep 24 2013 42 mins
    Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant and Joshua Daggs, Sales engineer
    As the types and methods of security solutions become more diverse the challenge to manage the network security infrastructure has grown exponentially. This webcast will look at the key challenges and offer solutions to some of the most pressing issues confronting network security professionals.

    During this webcast we will cover vulnerability assessment, threat detection and network auditing. Additionally our presenter will examine patch management, compliance, inventory assessment and effective control of BYOD (Bring Your Own Device) threats to your security and how to use these techniques to assure your data is as safe as possible.
  • Securing your IT Infrastructure: Vigilance is the Watchword Recorded: Aug 29 2013 34 mins
    Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
    The role of an IT administrator does not end when the network is set up and the necessary security measures are in place. The ongoing health and security of the network is also dependent on the business satisfying a number of laws and regulations which the IT administrator must be aware of. Furthermore, the admin must also monitor the network continuously for faults as well as suspicious/malicious activity.

    In this webcast we will show you how to use log data analysis and other techniques to proactively address hardware faults, malicious intrusions and other unwelcomed issues in real time. As a result, you can avoid having to react after the incident has occurred when, often, the damage has already been done.
  • Securing your IT Infrastructure: It’s a Jungle Out There Recorded: Jul 30 2013 45 mins
    Frank J. Ohlhorst
    The data on computer systems are an enterprise’s single most valuable resource. Data loss can be very costly, particularly for organizations in the small and medium business market where the difference between survival and closure can be razor thin. A network without proper security is an invitation to economic ruination, public humiliation, customer loss of trust and in some cases legal action.

    In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet based and cyber attacks. The basic methodology of each threat and how to mount effective counter measures, will be examined and reviewed.
Monthly webcasts on monitoring, managing & keeping a secure network
Tune in to our live and recorded webcasts to discover how GFI’s solutions help you secure, monitor and manage your network while enhancing productivity. These solutions consist of:

•Patch management
•Vulnerability assessment
•Web monitoring and filtering
•Network monitoring
•Portable device management

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing your IT Infrastructure: Vigilance is the Watchword
  • Live at: Aug 29 2013 4:00 pm
  • Presented by: Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
  • From:
Your email has been sent.
or close