Uncover and control suspicious or unauthorized behavior among privileged users with a single tool.
Watch Online
As digitization continues to pick up speed, the availability of data is the factor that determines business success. At the same time, enterprises must take a new approach to data protection.
Watch Online
In this episode of Business Matters, we reflect on the events of 2015 with Denis Zenkin, Senior Vice President, Corporate #Communications, who was in the middle of the whirlwind surrounding the #Duqu 2.0 #incident and outgoing communications.
Watch Online
With a state Senate mandate to provide cybersecurity services to all state agencies and a shortage of trained security personnel, the State of North Dakota SecOps team has deployed Cortex XDR and Demisto as the cornerstone of their new SOC strategy.
Watch Online
An endpoint analytics product built just for Splunk users!
Watch Online
Watch as Magda Chelly, Managing Director and CISO on Demand, Responsible Cyber, talks with RSA CTO Zulfikar Ramzan, PhD about the misconceptions she sees executives having about the InfoSec industry.
Watch Online
How are industry leaders thinking about the digital risk challenges emerging through digital transformation efforts? Watch to see what some RSA Conference attendees had to say.
Watch Online
Region 11 had a ransomware attack, which led them to a multi-tiered approach using VMware NSX. When they were attacked again, they were protected.
Watch Online
62% of security professionals in Asia Pacific say that defending against user behavior is their #1 challenge. Find out what else can businesses do to reduce the risk that email threats pose with Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco.
Watch Online
Seattle Proton Therapy turned to Dell EMC Data Protection to solve an immediate capacity need for backing up their patients’ medical records while complying with government regulations like HIPAA. They found the Dell EMC IDPA DP4400 appliance easy to deploy, with a minimal learning curve for their admins. With excellent deduplication, they continue to save space, and they’ve reduced the time to access crucial data from 1 to 2 weeks to a matter of minutes.
Watch Online
“The cloud cost was less than having it on-prem. We reduced our servers by 85%. We don’t have to patch the servers or worry about a breach.”
Watch Online
At the "Cybersecurity Insights: Security in the Digital Era" event, John Pescatore, Director at SANS Institute, discusses how infrastructure and security have always been linked, but not particularly successful. Why has it failed and what must happen now?
Watch Online
Email is the number one threat vector for delivery of malware into organizations. Stephen Dane, Managing Director, Cybersecurity, APJC, Cisco, explores the current state of the challenges that security practitioners face, and what CISOs can do to reduce the risk that email threats pose.
Watch Online
The company founder explains the main changes behind Kaspersky’s new brand, and also talks about why now is the right time to do it.
Watch Online
It should be: With today's attack landscape, continuous threat detection and monitoring is a must-have, not an option. See how Stealthwatch can help by analyzing your entire network traffic, on-premises or in the cloud. It reduces massive data sets to high-fidelity alarms using behavioral modeling, machine learning and Talos threat intelligence.
Watch Online