SOFTWARE DOWNLOAD:
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
VIDEO:
This brief animation highlights the technologies, benefits, and uses of Intel® Trusted Execution Technology (Intel® TXT) in server and cloud environments.
WEBCAST:
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
WEBCAST:
This webcast demonstrates how one hospital was able to benefit from single sign-on technology that helped foster physician satisfaction while meeting HIPAA compliance regulations.
WEBCAST:
In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
WEBCAST:
View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.
WEBCAST:
Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.
WEBCAST:
Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.
SOFTWARE DEMO:
Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.