PODCAST:
Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
SOFTWARE DEMO:
This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.
WEBCAST:
This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
WEBCAST:
Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
PRODUCT DEMO:
The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
TRIAL SOFTWARE:
Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
SOFTWARE DEMO:
Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
WEBCAST:
In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.
TRIAL SOFTWARE:
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.