12 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Zero Trust - Hope Beyond the Hype
Today’s security paradigm is broken. In a world where data and apps are spread across multiple clouds and people work across multiple locations, organizations are struggling to protect their IP and their reputation. Compounding the problem is a highly fragmented security market that requires organizations to piece together security solutions from thousands of point products.   There is hope on the horizon, but the...
April 13, 2023
Organizer: Dell Technologies | Forrester
Location: Webcast
Add Favorite
The Executive Order and What it Means f...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that federal civilian agencies, working in partnership with the private sector, must meet in order to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic stands ready to help agencies meet and exceed EO requirements with an affordable infrastructure model tha...
June 7, 2022
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
Advanced Threat Detection and Investiga...
Cybersecurity continues to grow more complex as attackers devise new means of gaining access to networks, data and identities. At the same time, the number of disruptive cyber-attacks is increasing at an alarming pace. IT executives understand the importance of monitoring their environments to detect and respond to more frequent and ever-evolving security threats. However, many organizations lack sufficient in-house resources with the speciali...
February 3, 2022
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Do Mid-size and Small Companies need Th...
A solid security strategy generally starts with implementation of access controls and cyber hygiene, such as managing admin privileges and promptly applying patches and updates. Preventive measures are essential, though many attackers are capable of devising ways to get past them. To address this risk, security professionals advise companies to incorporate threat monitoring and detection as an additional layer of protection. Sophisticated thre...
December 8, 2021
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Sheltered Harbor, Data Vaulting and Pow...
The sophistication of cyber criminals threatens businesses in every industry and every geography. But nowhere are the risks more evident than in the U.S. financial sector, where a successful attack on a brokerage, bank, credit union or other institution could undermine consumer confidence and threaten the entire U.S. financial system. What can be done to counter these threats? How can financial institutions improve their operational resilience...
January 28, 2021
Organizer: Dell Technologies
Location: Webcast
Add Favorite
[Tech Jam] Protecting Your PowerScale a...
Join Dell Technologies and Superna’s Andrew Mackay, President and CTO, for a discussion on how organizations can easily protect their enterprise data from disruptive and costly ransomware attacks. In the past 3 months, ransomware attacks are up 50% globally and have doubled in the US. Since remote work environments are not as easily secured, the threat of attacks becomes more real. Learn how you can get End-to-End Ransomware Protection f...
January 19, 2021
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Sheltered Harbor, Data Vaulting and Pow...
The sophistication of cyber criminals threatens businesses in every industry and every geography. But nowhere are the risks more evident than in the U.S. financial sector, where a successful attack on a brokerage, bank, credit union or other institution could undermine consumer confidence and threaten the entire U.S. financial system. What can be done to counter these threats? How can financial institutions improve their operational resilience...
December 2, 2020
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Sheltered Harbor Data Vaulting and Powe...
"The sophistication of cyber criminals threatens businesses in every industry and every geography. But nowhere are the risks more evident than in the U.S. financial sector, where a successful attack on a brokerage, bank, credit union or other institution could undermine consumer confidence and threaten the entire U.S. financial system.What can be done to counter these threats? How can financial institutions improve their operational resilience...
December 1, 2020
Organizer: Dell Technologies
Location: Webcast
Add Favorite
RSA Conference 2016
RSA Conference 2016 is your best opportunity to connect with the technology, trends and people that will protect our digital world. Based on feedback from past attendees, we have increased Expo hours, expanded session times, and added more Learning Labs and Crowdsourced Sessions. Plus, we've created new programs such as Birds of a Feather Sessions, Focus-On Series and much more.
February 29 - March 4, 2016
Organizer: RSA
Location: San Francisco, CA
Add Favorite
RSA Live Webcast - Are You Flirting wit...
You see technology advancements as business opportunities. So do criminals.If you're using password-only protection, your're flirting with risk. Learn why your security solution must include strong authentication to be effective, the various Authentication types - hardware, software, SMS, Risk-Based Authentication and more from the world's leader for almost 30 years in Authentication.
October 15, 2013
Organizer: EMC
Location: Webcast
Add Favorite
Back to Search Begin New Search