Webinar | Security
Palo Alto Networks

Cloud Security at DevOps Speed

25 Jul 2019 - 11:00AM SGT; 1:00PM AEST

The concept of DevSecOps is a team sport and is fundamentally changing the culture and collaboration among your security, development and operations teams.

This will require teams to foster...

Read MorePublished: 22/07/2019
Webinar | Security
Palo Alto Networks

Your Journey to the Cloud, Secured

23 Jul 2019 - 11:00AM SGT; 1:00PM AEST

Cloud adoption is a matter of “when”, not “if” for every organisation. In this training session, you will learn from how companies that develop core competencies at cloud adoption will have a distinct...

Read MorePublished: 22/07/2019
Webinar | Security
Palo Alto Networks

Stay Audit Ready with Cloud Compliance

24 Jul 2019 - 11:00AM SGT; 1:00PM AEST

For some organisations, their journey to the cloud is a sprint, not a marathon. If your organisation is rushing to the cloud it’s important to keep regulations as well as compliance in mind and start...

Read MorePublished: 22/07/2019
Whitepaper | Security
Imperva

Bad bots are evolving and are more sophisticated than ever, which can compromise your company's reputation, as well as your ability to retain customes and generate revenue. Read the infographic to...

Read MorePublished: 22/07/2019
Event | Security
Palo Alto Networks

Earlier this year, we announced PAN-OS® 9.0 – with 60+ new, tightly integrated innovations. We introduced a brand-new integrated DNS Security service, a Policy Optimizer tool to help you adopt best...

Read MorePublished: 19/07/2019
New Product | Security
Bitdefender

With Bitdefender Total Security 2020, you get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats.

Choose the ultimate mega-suite that...

Read MorePublished: 18/07/2019
Whitepaper | Security
Imperva

IT professionals are fighting an endless war of attrition against a constant barrage of bad bot attacks. Today’s bots represent a new generation of threats, rapidly shifting profiles and targets, and...

Read MorePublished: 17/07/2019
Whitepaper | Security
Imperva

Bad bots are evolving and are more sophisticated than ever, and no organization – large or small, public or private – is immune. Bots are increasingly mimicking real human workflows across web...

Read MorePublished: 17/07/2019
Event | Security
Sophos

Sohos Discover 2019 | Sydney

23 Aug 2019 - Sydney, Australia

Sophos Discover, an exclusive, invitation-only partner conference, gives attendees a unique opportunity to connect, learn and collaborate. Join Sophos to get an insider’s view into their Sophos...

Read MorePublished: 17/07/2019
Whitepaper | Security
Symantec

The Forrester report states that, when assessing MSSPs, CISOs in AP should look for ones that:

Customize services for the region rather than scaling "global" services
Prioritize a culture of...

Read MorePublished: 17/07/2019
New Product | Security
IBM

Explore a trial of IBM QRadar on Cloud, IBM's industry-leading security analytics platform. See how QRadar can accurately detect suspicious activities in real-time, automatically prioritize the most...

Read MorePublished: 17/07/2019
New Product | Security
IBM

IBM Cloud Identity helps you secure user productivity with cloud-delivered Single Sign On (SSO), multifactor authentication, and identity governance. It comes with thousands of pre-built connectors to...

Read MorePublished: 17/07/2019
Event | Security
IBM

Cyber-threats and how to handle them | Melbourne

9 Aug 2019 - Melbourne, Australia

There was a time when cyber-security was strictly the concern of someone in the IT department with little thought from the board and C-something-O's. Times have changed, and with most companies...

Read MorePublished: 17/07/2019
Event | Security
IBM

Cyber-threats and how to handle them | Sydney

26 Jul 2019 - Sydney, Australia

There was a time when cyber-security was strictly the concern of someone in the IT department with little thought from the board and C-something-O's. Times have changed, and with most companies...

Read MorePublished: 17/07/2019
Event | Security
IBM

Cyber-threats and how to handle them | Brisbane

2 Aug 2019 - Brisbane, Australia

There was a time when cyber-security was strictly the concern of someone in the IT department with little thought from the board and C-something-O's. Times have changed, and with most companies...

Read MorePublished: 17/07/2019
Whitepaper | Security
Auth0

See the latest overview from Forrester Consulting of 26 Authentication Management Providers. Written by Andras Cser and Merritt Maxim and published in August, 2018. When you download the Now Tech...

Read MorePublished: 17/07/2019
Whitepaper | Security
Auth0

The Auth0 identity platform provides authentication and authorization as a service, securely handling over 2.5 billion logins per month. On AWS, the architecture leverages AWS auto scalability and...

Read MorePublished: 17/07/2019
Event | Security
FireEye

FireEye Cyber Security Roadshow 2019 | Sydney

9 Aug 2019 - Sydney, Australia

This is an exclusive invite-only event to cyber security professionals to join us for a half-day session conducted by FireEye.

Read MorePublished: 16/07/2019
Event | Security
FireEye

FireEye Cyber Security Roadshow 2019 | Melbourne

8 Aug 2019 - Melbourne, Australia

This is an exclusive invite-only event to cyber security professionals to join us for a half-day session conducted by FireEye.

Read MorePublished: 16/07/2019
Event | Security
FireEye

FireEye Cyber Security Roadshow 2019 | Canberra

7 Aug 2019 - Canberra, Australia

This is an exclusive invite-only event to cyber security professionals to join us for a half-day session conducted by FireEye.

Read MorePublished: 16/07/2019
Show More..
Top
ITUpdate loading
Loading...