Whitepaper | Security | End Point
Zscaler

Both defense and civilian government agencies face an unprecedented challenge in securing data as the COVID-19 pandemic has created a rapid surge in remote working and connections with non-enterprise...

Read MorePublished: 21/09/2020
Whitepaper | Security | End Point
Zscaler

With users' ability to connect everywhere more commonly, and the increasing use of smartphones and tablets, IT has needed to pivot and support their entire, if not close to entire global workforce...

Read MorePublished: 21/09/2020
Whitepaper | Security | End Point
Zscaler

Working from anywhere has fastly become the new reality to how we work on a day to day basis. IT teams have been tasked to help employees and third-parties do so as quickly and securely as possible....

Read MorePublished: 21/09/2020
Webinar | Security | Firewall
Juniper Networks

Contrail Cloud Native APAC

1 Oct 2020 - 9:45AM SGT

This webinar will educate Sales and SEs regarding the Contrail Cloud Platform.

Read MorePublished: 21/09/2020
Webinar | Security | Access Management
ManageEngine

According to Verizon's 2020 Data Breach Investigations Report, the three kinds of attacks that account for 67% of breaches are credential theft, errors and social attacks.

With advancements in...

Read MorePublished: 18/09/2020
Webinar | Security | SIEM
ManageEngine

How to detect anomalous security events in the network

14 Oct 2020 - 11:00AM SGT; 2:00PM AEDT

An Active Directory user just accessed a large volume of files from a system they have never used before. Another user who normally works from 9am to 5pm logged in to a critical server at 3am....

Read MorePublished: 18/09/2020
Webinar | Security | Access Management
ManageEngine

Time and again high profile security breaches make the headlines, and often, the major reason behind most devastating security breaches are associated with the classic end user turned into an insider...

Read MorePublished: 18/09/2020
Webinar | Security | SIEM
ManageEngine

Fundamentals of log analytics

30 Sep 2020 - 2:00PM AEST

You probably already know that you have to rely on logs to detect and investigate a security incident. In order to gain actionable insights from your logs, you need to implement robust analytical...

Read MorePublished: 18/09/2020
Webinar | Security | Access Management
ManageEngine

Tried and true, Active Directory (AD) is solely responsible for controlling access to all the networked resources in an organization. Being the single authority for authentication and authorization,...

Read MorePublished: 18/09/2020
Webinar | Security | Access Management
ManageEngine

With the massive shift to remote working also comes a rise in cyberattacks and insider threats. Along with this, as bring your own device (BYOD) policies, cloud-based applications, and edge computing...

Read MorePublished: 18/09/2020
Webinar | Security | Access Management
ManageEngine

Compromised passwords are one of the more common ways by which hackers can get into your organization. With remote work bringing a new set of password management issues and loopholes, hackers are...

Read MorePublished: 18/09/2020
Webinar | Security | Access Management
Microsoft

This webinar will discuss in detail how Saviynt and Microsoft together can deliver a robust next-generation Identity, Security, and Access Management solution.

Read MorePublished: 18/09/2020
Whitepaper | Security | SIEM
AT&T Cybersecurity

The Security and Information Event Management (SIEM) market is undergoing transformation, fueled by continuously evolving IT infrastructure: cloud computing, mobility, virtualization, and other...

Read MorePublished: 16/09/2020
Whitepaper | Security | IDS IPS
AT&T Cybersecurity

As businesses increasingly embrace mobile, cloud, and edge computing, network traffic patterns are changing. This is due to the expectation for anytime, anywhere access to the network and the...

Read MorePublished: 16/09/2020
Promotion | Security | End Point
Sonicwall

Don’t let substandard endpoint protection take you down. Replace your existing endpoint protection solution with SonicWall Capture Client (NGAV) and get up to a year free.

Read MorePublished: 16/09/2020
Promotion | Security | Firewall
Sonicwall

Mix, match and maximize your savings. Build the perfect Boundless Cybersecurity strategy that matches the business and security objectives of your organization. The more you layer security across...

Read MorePublished: 16/09/2020
Promotion | Security | Firewall
Sonicwall

Upgrade your current SOHO or TZ firewall to an eligible model for free when you pair it with the purchase of a three-year SonicWall Advanced Gateway Security Suite subscription. This combo delivers...

Read MorePublished: 16/09/2020
Whitepaper | Security | Firewall
Sonicwall

The first half of 2020 marked a new era in cybersecurity. In this hyper-distributed IT reality, the new office is anywhere, and threats are everywhere.

With opportunistic attackers out in...

Read MorePublished: 16/09/2020
Webinar | Security | Web Application Firewalls
Palo Alto Networks

Cloud Security for the modern enterprise

30 Sep 2020 - 12:30PM SGT; 2:30PM AEST

Join our expert in this webinar as we discuss the latest requirements for governance and compliance including integration into CI/CD and many others.

Read MorePublished: 16/09/2020
Webinar | Security | End Point
CrowdStrike

Falcon OverWatchTM, the CrowdStrike® elite team of threat hunters, has the unparalleled ability to see and stop the most sophisticated threats, leaving adversaries with nowhere to hide.

Join...

Read MorePublished: 16/09/2020
Show More..
Top
ITUpdate loading
Loading...