VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
TRIAL SOFTWARE:
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
WEBCAST:
Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
VIDEOCAST:
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
TRIAL SOFTWARE:
PowerTerm WebConnect enhances the flexibility and reliability of Microsoft Terminal Servers, Virtual Desktops and Blade PCs. More flexible, affordable and easier to deploy and extend throughout the organization, Ericom's centrally administered solution installs and deploys in hours making it an ideal application for mobile workforces.
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
SOFTWARE DOWNLOAD:
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
SOFTWARE DOWNLOAD:
Having trouble with storage latency issues? SolarWinds® Storage Response Time Monitor free tool tracks those sluggish VMs, shows the top host to datastore total response times and a count of additional high latency offenders.
WEBCAST:
Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)