Back to Search Begin New Search Save Search Auto-Notify
Identity: Powering Enterprise Cybersecu...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Identity is the new perimeter— and privileged access management (PAM) is a cornerstone of modern identity and access security. Identity and access security talks to the tools, processes, and policies that determine the right individual can access the right resource, at the right time, for the right reason, to complete their objective. To achie...
Add Favorite
Embracing Zero Trust: Strengthening Sec...
Attendees of this on-demand webinar experienced a comprehensive panel discussion on Zero Trust architecture, where we will delve into the key principles, components, and implementation strategies of this security model.
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
(IAM) Advantage: Best in Class Solution...
Attendees of this on-demand webinar learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches and unauthorized access to sensitive information Streamline access granting and revocation to save time and resources while reducing risk
Add Favorite
Enhance Google Workspace Functionality...
In this on-demand webinar, attendees learned how: BCE solves not just data in flight but also data in motion challenges. You can either augment or even replace traditional VPN technologies. Decrease operational costs of securing a distributed workforce.
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
The Next Generation of PCoIP Zero Clien...
Join this ClearCube webinar and hear from subject-matter experts on how you will: Gain an understanding of the Trusted Zero Client endpoints from ClearCube Technology, including how these new devices work with PCoIP, the HP/Teradici Trust Center software, and your management console software Hear clear explanations of the functionality currently available and what’s on the roadmap for release in the coming months See a comparison of the...
Add Favorite
Panel Webinar: Combatting Supply Chain...
With the increasing frequency and sophistication of supply chain attacks, it is critical for organizations to adopt a zero trust approach to their security strategy. This panel will bring together experts in endpoint, identity, and network security to discuss best practices for implementing zero trust in supply chain risk management. Panelists will explore the challenges and benefits of a zero trust model, share case studies of successful impl...
Add Favorite
Best Practices for Implementing Zero Tr...
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. During this webinar, you will hear from industry expert David Cagical, former CIO for the State of Wisconsin, and Matt Singleton,...
Add Favorite
Back to Search Begin New Search