Operating System Security Multimedia

(View All Report Types)
Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

VMware vShield: Secure your Cloud with Virtualization-aware Security
sponsored by VMware, Inc.
VIDEO: Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost.  Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
Posted: 20 May 2011 | Premiered: 20 May 2011

VMware, Inc.

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Using Mac and Windows apps side-by-side
sponsored by Parallels, Inc.
WEBCAST: Listen to this podcast to learn how you can run Mac and Windows applications side-by-side
Posted: 14 Aug 2012 | Premiered: Aug 14, 2012

Parallels, Inc.

Transform with Mobile Apps
sponsored by AT&T Corp
WEBCAST: It’s time to start thinking strategically about enterprise mobile applications. Outside of a few vertical industries, IT isn’t able to enforce a single device platform or OS. Applications are being requested for a wider range of devices, and more end-user applications are coming from outside IT.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork