21 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
How to Build a Strong IAM Foundation wi...
Identity Governance and Administration (IGA) provides the identity foundation that powers today’s most important security initiatives, including Zero Trust, Digital Transformation, and Cyber Resilience. With a comprehensive IGA program, you'll have the critical capabilities and identity services to bridge data and product silos and adapt at the speed of change. Join us for this webinar on Tuesday, November 17th to learn how IGA: Delivers...
November 17, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
Tech Tips: Extend Enterprise Security t...
When it comes to security organizations want to be sure that their systems are protected. Multi-factor authentication (MFA) is a key control to ensuring that only authorized individuals access your critical assets, including the mainframe. Where mainframe organizations struggle is extending enterprise security control to mainframe applications. The practice of separate authentication should be reevaluated, the mainframe must be integrated with...
November 11, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
DevSecOps Easy Modern Secure Applications
Most security breaches occur in the application and not the system. The DevSecOps methodology diminishes security breaches early in the DevOps application lifecycle, but with that, there needs to be a centralized application security solution. The Fortify Security Suite offers various levels of application security that are a part of the CI/CD pipeline code delivery. Join Micro Focus Government Solutions on Wednesday, October 21, during Carah...
October 21, 2020
Organizer: Micro Focus Government Solutions
Location: Webcast
Add Favorite
IM&G Webinar Series: Reduce Privacy and...
Please join Wyldlynx to learn how to reduce privacy and security risk while enabling compliance, specifically: Analyse – understand what you have and where? “you don’t know what you don’t know” Protect – high risk, high value, and sensitive data across multiple data sets Data Privacy – Understand your data and associated risk level with it Discover – personal, medical or credit information and a...
September 10, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
4 Steps to Building a Software Factory
Agencies are seeking new ways to support their development teams to achieve consistency in their various software applications. A software factory attains the continuity of sharing data within various servicing tools and provides security, through a reliable and secure software code. In this course, learn how agencies such as the Defense Department are using software factories to enhance their DevSecOps operations in three main areas of automa...
July 31, 2020
Organizer: Micro Focus Government Solutions
Location: Webcast
Add Favorite
Information Management & Governance Web...
Data Access Governance – Mitigating Risk Associated with Unstructured Data With Micro Focus solutions for Data Access Governance, you can now gain the same level of control over unstructured data as you have with systems, applications, and identities. This comprehensive approach helps to ensure that the right people have access to the right information - including information stored in files on your network. In this webinar, we will show...
June 17, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
Information Management & Governance Web...
Understanding your Data and the Security of I.T. Data is critical to every aspect of how an organization functions, and it is constantly growing, which is why it's so important to have the right processes and practices in place to manage and secure company data. Data governance policies define rules within an enterprise according to several factors, including data access, storage, security, usage, and disposal. In this webinar, you will learn...
June 10, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
Conquering the Authentication Challenge...
As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default. In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how...
June 2, 2020
Organizer: BrightTALK
Location: Webcast
Add Favorite
DJ MITRE: Achieving Harmony in your SOC
Join this webinar to see how success on the dancefloor is surprisingly similar to success in a SOC… you should start slow, then build over time (in the correct order) to achieve harmony. If you define the known threats and write rules to catch them, you’ll be left with a smaller subset of unknown threats. Hunt those down, and they’ll become known. Then, repeat the process. The MITRE ATT&CK Framework can be an extremely u...
March 26, 2020
Organizer: Micro Focus
Location: Webcast
Add Favorite
#DevDay NYC
#DevDay The What, How and Where of Modernization Your COBOL applications are at the heart of your business and fueling your innovation. But what does innovation look like for your business and for your applications? How and where do you start? The answer is simple - #DevDay. What is #DevDay? View the #DevDay Infographic to get the facts on this must-attend event for developers! Application Modernization: Transform core business systems Applica...
September 19, 2019
Organizer: Micro Focus
Location: New York, NY
Add Favorite
Back to Search Begin New Search