Webinar | Security
Kaseya

Unified Endpoint Management is a critical component of digital transformation as it allows for greater workforce agility. Managing an increasingly complex ever-expanding IT environment can become a...

Read MorePublished: 17/01/2019
Whitepaper | Security
Mimecast

IT decision-makers from all industries agree: the biggest cybersecurity risk is human error. There is only so much that anti-virus solutions can do when users don’t know how vulnerable they are. Thus,...

Read MorePublished: 16/01/2019
Whitepaper | Security
Mimecast

The European Union General Data Protection Regulation means less access to employee information and behaviors and thus less insight on risk data. Security teams count on this data to stay one step...

Read MorePublished: 16/01/2019
Whitepaper | Security
Mimecast

In 2018, Mimecast Research Labs discovered a memory leak vulnerability in Microsoft Office that may have resulted in the unintended leakage of sensitive information in millions of previously-created...

Read MorePublished: 16/01/2019
New Product | Security
Imperva

Imperva Incapsula DDoS protection mitigates the largest attacks immediately without incurring latency or interfering with legitimate users. Multiple DDoS protection options have been designed to meet...

Read MorePublished: 16/01/2019
New Product | Security
Imperva

Web application attacks deny services and steal sensitive data. Imperva Web Application Firewall (WAF) analyzes and inspects requests coming in to applications and stops these attacks.

Read MorePublished: 16/01/2019
Whitepaper | Security
Imperva

Enterprises are increasingly aware of the need to protect their systems and users from cyberattack. This is a good thing, as it indicates a growing awareness of security risks, no doubt underpinned by...

Read MorePublished: 16/01/2019
Whitepaper | Security
Cylance

The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 encouraged the migration of personal health information (PHI) to electronic health records (EHRs). As part of...

Read MorePublished: 16/01/2019
Whitepaper | Security
Cylance

The technologies used to protect endpoint devices have changed significantly over the years. Here’s a quick look at where the industry has been, where it is today, and where it is quickly headed.

Read MorePublished: 16/01/2019
Whitepaper | Security
Cylance

Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and...

Read MorePublished: 16/01/2019
Whitepaper | Security
Cylance

The innovative use of AI allows healthcare providers to adopt a proactive security posture alleviating many of their common issues and limitations. Read Leveraging AI to Protect Hospital IT...

Read MorePublished: 16/01/2019
New Product | Security
McAfee

Power-up advanced use cases with factory-tested and supported content and partner integrations for your SIEM solution

Read MorePublished: 16/01/2019
Whitepaper | Security
Barracuda Networks

At Barracuda, they wanted to know how widespread SD-WAN deployments are, how organizations are securing them, what benefits they’re seeing and what challenges – if any – persist. They commissioned...

Read MorePublished: 15/01/2019
Event | Security
Microsoft

Microsoft 365 Security Workshop | Jakarta

30 Jan 2019 - Jakarta, Indonesia

Organizations of all sizes and in all industries face security challenges. According to the Verizon Data Breach Investigations Report, the average cost per breach is U.S. $4 million. Technology is a...

Read MorePublished: 14/01/2019
Event | Security
Palo Alto Networks

Palo Alto Cyber Range - Sydney | 2 - 3 Apr 2019

2 - 3 Apr 2019 - Sydney, Australia

Welcome to the next step in security training. Part immersive video game, part skills workshop and part team-building exercise, Cyber Range is the antidote to standard, dry-as-dust, snooze-fest...

Read MorePublished: 14/01/2019
Event | Security
Palo Alto Networks

Security professionals who will share their experience about how to secure your cloud digital transformation, every step of the way.

This event, provides a great opportunity to understand Palo...

Read MorePublished: 14/01/2019
Event | Security
Palo Alto Networks

Security professionals who will share their experience about how to secure your cloud digital transformation, every step of the way.

This event, provides a great opportunity to understand Palo...

Read MorePublished: 14/01/2019
Event | Security
Palo Alto Networks

Palo Alto Cyber Range - Sydney | 5 - 6 Mar 2019

5 - 6 Mar 2019 - Sydney, Australia

Welcome to the next step in security training. Part immersive video game, part skills workshop and part team-building exercise, Cyber Range is the antidote to standard, dry-as-dust, snooze-fest...

Read MorePublished: 14/01/2019
Event | Security
Palo Alto Networks

Security professionals who will share their experience about how to secure your cloud digital transformation, every step of the way.

This event, provides a great opportunity to understand Palo...

Read MorePublished: 14/01/2019
Webinar | Security
Palo Alto Networks

Join Palo Alto Networks for the Advanced Endpoint Protection Ultimate Test Drive, where you'll get hands-on experience with next-generation enterprise security platform.

In this free half-day...

Read MorePublished: 14/01/2019
Show More..
Top
ITUpdate loading
Loading...