Open Data, Not Firewalls

Pantheon Platform

Data is best when shared. On your website, in the cloud. But sometimes you need a firewall, too. It’s a security thing. What if you could have it all—open data, firewall, and cloud? See how enterprises are opening data from behind the firewall to share with employees, constituents, and students, while running their Drupal and WordPress websites in the cloud. Watch this 40-minute webinar, Open Data, Not Firewalls now!
Watch Now

Spotlight

"Global eCommerce sales are predicted to reach $1.5 trillion in 2014 and are further predicted to grow by a meteoric 57% by 2017, according to eMarketer. A downside of this explosive growth is the increased opportunity for online fraud.

Building smarter rules around fraud detection and automating the process is proven to increase detection rates, reduce false positives and improve visitor experience. IP Intelligence can be used to automatically block suspect traffic, request verification (via email or SMS) or flag suspect activity for further internal review."


OTHER ON-DEMAND WEBINARS

Application Security Verification/Testing Approach

Software security testing is an integral part of the secure software development life cycle. Security bugs and flaws are different from other types of faults in software, but we are not in the dark, and don’t need to reinvent the wheels. A review of existing models, frameworks and standards that can help organizations excel in their software security testing efforts

Top 5 Strategies to Prevent Ransomware

KnowBe4

It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight. In this webinar “Top 5 Strategies to Prevent Ransomware” Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help you prevent ransomware.

Xsuite: Privileged Identity Management for Modern Enterprises

"In this webcast, we’ll explain how Xsuite and privileged identity management can stop attackers at multiple points in the data breach lifecycle, preventing damage and disruption. Join us to learn: - Who are privileged users and why are they important? - How do attackers exploit privileged users and their credentials to carry out breaches? - See a hands-on demonstration of Xsuite and how it can manage, control, and protect privileged users and credentials and your business assets."

Protect and Manage the (Crypto) Keys to Your Castle

"Jeff Kalwerisky will give us an overview of the most dangerous mistakes organizations are making when it comes to key management and how you can implement a series of best practices to mitigate these mistakes today."

Spotlight

"Global eCommerce sales are predicted to reach $1.5 trillion in 2014 and are further predicted to grow by a meteoric 57% by 2017, according to eMarketer. A downside of this explosive growth is the increased opportunity for online fraud.

Building smarter rules around fraud detection and automating the process is proven to increase detection rates, reduce false positives and improve visitor experience. IP Intelligence can be used to automatically block suspect traffic, request verification (via email or SMS) or flag suspect activity for further internal review."

resources