Network Perimeter Security Multimedia

(View All Report Types)
Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

5 ways to improve WLAN reliability, performance and capacity
sponsored by Hewlett Packard Enterprise
WEBCAST: Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.
Posted: 26 Aug 2011 | Premiered: Aug 26, 2011

Hewlett Packard Enterprise

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

SolarWinds ipMonitor v9.0
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: ipMonitor delivers out-of-the-box availability monitoring that is ideal for environments with less than 500 devices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.

Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
Posted: 04 Apr 2014 | Premiered: 05 Feb 2014

Cisco Systems, Inc.

QuickTour Demo: Key Differentiators between MicroStrategy and Cognos
sponsored by MicroStrategy
WEBCAST: This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Cognos.
Posted: 09 Jun 2008 | Premiered: Jun 7, 2008

MicroStrategy

The "Hard Truths" About Managing Administrative and Application Identities
sponsored by CyberArk Software, Inc
VIDEOCAST: This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
Posted: 16 Jul 2008 | Premiered: Jul 16, 2008, 09:00 EDT (13:00 GMT)

CyberArk Software, Inc

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.