TRIAL SOFTWARE:
With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
SOFTWARE DEMO:
This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.
SOFTWARE DEMO:
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
SOFTWARE DOWNLOAD:
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
WEBCAST:
Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
WEBCAST:
View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
WEBCAST:
Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)
VIDEOCAST:
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.