NHS Dumfries & Galloway: Building the Business Case for Mitigating Risks

Join Gordon Wallace, Technical Manager at Qualys, and Andrew Turner, Head of Information Assurance and Security at NHS Dumfries & Galloway for this informative webcast. You’ll see how the IT department of NHS Dumfries & Galloway secures its IT systems for all medical facilities and data centres in the region—including 1,000 general practitioners and 4,500 staff.
Watch Now

Spotlight

"This white paper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications.

In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as:
Better defense against zero-day threats and spam servers;
More comprehensive signatures and URL databases;
Supporting increased security for remote users."


OTHER ON-DEMAND WEBINARS

Break Out Of the Security Silo with Adaptive Platforms

Intel Security

The latest targeted attacks are driving a shake-up in security architectures. Today’s targeted attacker is adaptive, persistent and can easily bypasses controls that exist in traditional silos. What this means is that disconnected security controls now have to be integrated and that you may well have to consider deploying adaptive security platforms.
Watch Now

How to Develop Military-Grade Cybersecurity

Join this session to hear from Mike Walls, a US Navy officer with combat cyber operations experience, who will share insights on how to keep your organizations' data secure against the most persistent and motivated cyber adversaries.
Watch Now

"Digital First World: Data Sovereignty and Privacy in the Cloud"

"Businesses today operate across more geographic boundaries than ever before and as data travels globally, a company's compliance, risk, and data governance obligations become exponentially more complex. Data moving across public and private clouds also increases breach risk, and compliance regulators can stop projects in their tracks - sometimes with drastic consequences to the business. How is information stored and managed in the cloud? A question every company should be asking when dealing with the privacy and security of information stored in the cloud. Join our panel of AvePoint experts, led by Dana Simberkoff, Chief Compliance and Risk Officer, to discuss data sovereignty and privacy in the cloud. With many factors to be taken into consideration, our panel offers tips and advice to help understand the existing or upcoming data protection laws in the EU and ways technology can keep your data safe in the cloud."
Watch Now

Optimization that Surpasses: Security Policy Orchestration for Hybrid Networks

Enterprises adopting virtualization will find themselves managing thousands of network security changes per week. Handling these changes effectively and securely requires visibility and control across virtual and physical infrastructure. A security policy orchestration solution can address the security and agility challenges with a single console that monitors and manages security policies across hybrid IT. In this session we will discuss real life examples of the challenges in network virtualization and how they can be addressed through orchestration.
Watch Now

Spotlight

"This white paper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications.

In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as:
Better defense against zero-day threats and spam servers;
More comprehensive signatures and URL databases;
Supporting increased security for remote users."

resources