API Security - Unlock the Secrets

Bank information security

The application programming interface (API) has become the basic building block of business allowing applications and software to talk and share data. APIs are the critical component for exchanging data between all types of entities. In this Webinar we'll break down how APIs are used and unlock the secrets to securing them. Highlights include: API Gateways are API Management tools not security; Providing audits & ensuring proper inspection on each transaction; Equipping every transaction for proper authentication and authorization.
Watch Now

Spotlight

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

OTHER ON-DEMAND WEBINARS

Your Network Needs to Be the First and Last Line in Your Cyber-Security Defense

VMware

Most people think firewalls when it comes to network security and defending against cyber-threats. But with today’s increasingly sophisticated cyber-security threats, you need to think beyond firewalls to your entire network—from center to edge. In this webinar, we will take a look how network virtualization can extend your security from data center, to branch, to cloud, to edge. In this webinar, you will learn: The latest outlook on the growing cyber-security threats. How you can better protect your data center by focusing on your network.How to extend your network and security to branches and beyond with software-defined WAN.
Watch Now

Enabling and Securing Remote Users of Teams

Microsoft recently reported that video calls on the Microsoft Teams platform grew more than 1,000% during the month of March, and they've added more than 12 million daily active users to the robust collaboration tool. According to Forrester, 85% of security breaches occur because of mismanaged licenses. Watch now to hear our sec
Watch Now

Global Threat Report: The Year of the Next-Gen Cyberattack

Carbon Black

2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever attackers have become in evolving to remain undetected — using techniques such as lateral movement, island hopping and counter incident response to stay invisible. Join our discussion on the latest in threat intelligence including: The most prevalent ransomware and commodity malware families during the past year. Why we're seeing increases in nation-state cyberattacks.
Watch Now

Workforce continuity and the Future of Work

For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage you will learn: What is business continu
Watch Now

Spotlight

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

resources