Closed Loop Security Multimedia

(View All Report Types)
Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Security Practices for Vmware
sponsored by Vyatta Inc.
WEBCAST: This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.
Posted: 03 Aug 2012 | Premiered: Jun 20, 2012

Vyatta Inc.

Unlocking the Value of Data, Securely with AWS and Privitar
sponsored by Privitar, AWS
VIDEO: This webinar explains the importance of modern data security compared with the traditional data security system. Tune in to learn how you can elevate your security with the AWS Cloud.
Posted: 12 Jun 2020 | Premiered: 12 Jun 2020

Privitar, AWS

The Payment Island Deconstructed
sponsored by FireHost Inc.
WEBCAST: This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

Mobile Application Security from HP - Build security into your mobile applications
sponsored by Hewlett-Packard Enterprise
WEBCAST: Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.
Posted: 04 Jan 2012 | Premiered: Jan 4, 2012

Hewlett-Packard Enterprise

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace
sponsored by VMware, Inc.
WEBCAST: This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management.
Posted: 12 Sep 2013 | Premiered: Sep 12, 2013

VMware, Inc.

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

Keep Endpoint Data Safe
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST: This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

Fujitsu