SOFTWARE DEMO:
IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
WEBCAST:
Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)
VIDEO:
In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
VIDEO:
In this video, Computer Weekly's editor-in-chief, Bryan Glick, talks us through the key areas that IT managers in the UK are planning on spending their budgets on. Results and statistics are taken from Computer Weekly's 2018 IT Priorities survey in which over 250 IT decision makers took part.
SOFTWARE DEMO:
Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
PODCAST:
Virtualization is now generally recognized as one of the key enablers of these objectives. As organizations explore virtualization solutions, the challenge is to select the right strategic vendor with the best solution set for their business.
SOFTWARE DEMO:
Check out this software demo to see how the IBM Lotus Complete Collaboration Express Starter Pack works in conjunction with Lotus Domino and other applications to provide excellent collaboration capabilities and numerous other benefits.
VIDEOCAST:
Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
TRIAL SOFTWARE:
Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
SOFTWARE DOWNLOAD:
With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.