Filters:
    New Product|Security

    Proofpoint Essentials

    Small businesses get hit by the same advanced attacks that target large organizations. You need a security solution that is just as effective. Proofpoint Essentials packages security controls into a...

    Whitepaper|Security
    Posted Date:22/05/2018

    The Dirty Secrets of Network Firewalls

    In late 2017 Sophos sponsored an independent survey of 2,700 IT Managers across ten countries. Read this paper to discover how firewalls are failing to meet the needs of today's businesses, and get...

    Webinar|Security

    Artificial Intelligence in Cyber Warfare: A Primer

    31 May 2018 - 11:00AM SGT; 1:00PM AEST

    Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better...

    Event|Security

    Connected Threat Defence Security Workshop | Perth

    30 May 2018 - Perth, Australia

    Join the Connected Threat Defence workshop in cities near you. It'll be packed full of best practice advice from security experts to help you understand the anatomy of an attack and walk away with a...

    Whitepaper|Security
    Posted Date:15/05/2018

    Battling Cyber Threats in Asia Pacific

    Every year high profile cyberattacks against major corporations and organizations have been increasing to the point where International Data Corporation (IDC) call cyberattacks, “the new norm.” In...

    Webinar|Security

    The 5 Types of BEC Scams

    31 May 2018 - 10:30AM AEST

    Business Email Compromise (BEC) is a type of scam targeting companies who conduct wire transfers and have suppliers abroad.

    Join Jon Clay at this live webinar as he goes over five types of BEC...

    Webinar|Security

    How to Stop Modern Day Threats

    31 May 2018 - 2:30PM SGT

    In this session, Sophos will share you the recommended technology solutions that will protect your users against modern threats.

    Whitepaper|Security
    Posted Date:11/05/2018

    Look What’s Riding Your Network: A Deeper Look at Growing Threats to...

    Cybercriminals release 10 new malicious Android® Package Kits, or APKs, for every 1,200 mobile subscriptions added. With growth rates more than six times greater than that of mobile smartphone...

    Event|Security

    Prevent Costly Data Leaks from SaaS Apps | Wellington

    31 May 2018 - Wellington, New Zealand

    SaaS adoption in your organisation is happening, whether you know it or not, and it's putting you at risk of costly data leakage.

    Join Palo Alto for lunch to learn how to prevent against data...

    Event|Security

    BlackBerry® Secure™ World Tour 2018 | Australia

    7 Jun 2018 - Sydney, Australia

    The BlackBerry® Secure™ World Tour is the premier industry event for enterprise leaders looking for insights into the hyperconnected world of people, enterprises, assets and infrastructure, where the...

    Event|Security

    Check Point Lunch and Learn Cloud Security | Hong Kong

    5 Jun 2018 - Hong Kong

    During 2017 over 50% of security incidents handled by Check Point’s incident response team were cloud-related, and more than 50% of those were account takeovers of SaaS apps or hosted...

    Event|Security

    Check Point Lunch & Learn 2018 | Bangkok

    4 Jun 2018 - Bangkok, Thailand

    The 5th generation of cyber-attacks causes a level of damage that we have never seen before, but did you know that 97% of organizations are unprepared for a cyber-attack?

    Join Check Point at...

    Event|Security

    Check Point CloudGuard Hands-on Workshop | Hong Kong

    25 May 2018 - Hong Kong

    With benefits like increased agility, improved efficiencies and lower overall fixed costs, it's no surprise that nearly 95 percent of businesses are now using the cloud. In conjunction with this rapid...

    Event|Security

    Connected Threat Defence Security Workshop | Brisbane

    29 May 2018 - Brisbane, Australia

    Join the Connected Threat Defence workshop in cities near you. It'll be packed full of best practice advice from security experts to help you understand the anatomy of an attack and walk away with a...

    Event|Security

    Connected Threat Defence Security Workshop | Adelaide

    24 May 2018 - Adelaide, Australia

    Join the Connected Threat Defence workshop in cities near you. It'll be packed full of best practice advice from security experts to help you understand the anatomy of an attack and walk away with a...

    Press Release|Security

    Arista Introduces Cognitive Cloud Networking for the Campus

    7 May 2018

    Arista Networks today announced a new network architecture designed to address transitional changes as the enterprise moves to an IoT (Internet of Things)-ready campus. Leveraging EOS® and...

    Whitepaper|Security
    Posted Date:09/05/2018

    State of the Internet / Security : Carrier Insights, Spring 2018...

    Akamai, the world’s largest and most trusted cloud delivery platform, uses its globally distributed Akamai Intelligent Platform™ to process trillions of Internet transactions each day. This allows...

    Whitepaper|Security
    Posted Date:09/05/2018

    Cloud Relational Database as a Service (RDaaS) Security Guide

    Cloud providers have begun to offer sophisticated technology platforms for hosting databases in the cloud such as Relational Database as a Services (RDaaS). As organizations plan or begin to migrate...

    Event|Security

    Kaseya Roadshow 2018 | Melbourne

    6 Jun 2018 - Melbourne, Australia

    Join Kaseya at one of their 2018 Executive Briefings to discuss People, Data and Devices: Is Your IT Environment ‘Really’ Securely Managed?. The half-day events will provide an opportunity for MSPs to...

    Event|Security

    Kaseya Roadshow 2018 | Brisbane

    30 May 2018 - Brisbane, Australia

    Join Kaseya at one of their 2018 Executive Briefings to discuss People, Data and Devices: Is Your IT Environment ‘Really’ Securely Managed?. The half-day events will provide an opportunity for MSPs to...

    Your search did not match any content.
    Show More..
    Top
    ITUpdate loading
    Loading...