Four mainframe security gaps that put sensitive data at risk and more

February 20, 2009 Published by  SearchSecurity.com ...

February 20, 2009 Published by  SearchSecurity.com

Webcast & Podcast Alert

SearchSecurity.com
View these Online Events recently held on SearchSecurity.com:
Four mainframe security gaps that put sensitive data at risk
The Challenges and Solutions of Unified Communications
Symantec Endpoint Protection Q & A with the Experts
Calculating Cost Savings from User Provisioning - Forrester Consulting Analysis
Four mainframe security gaps that put sensitive data at risk
WHEN: AVAILABLE ON DEMAND
SPONSOR: I/O Concepts Inc.

Wide network access to mainframe resources creates a variety of security threats. This podcast reviews the four biggest risks to highly-sensitive data. The webcast reviews an approach to mitigate these risks and meet regulatory compliance requirements.

WEBCAST: Closing the Four Security Risk Gaps of Mainframe Console Access
PODCAST: The Four Security Risk Gaps of Mainframe Console Access - And How To Close Them

VIEW WEBCAST DOWNLOAD PODCAST
The Challenges and Solutions of Unified Communications
WHEN: AVAILABLE ON DEMAND
SPONSOR: Quest Software

Despite the popularity of instant messaging and other forms of unified communications, these technologies are largely unmanaged in many enterprises. View this webcast to learn how to secure, preserve and control the use of unified communications in your organization.
VIEW WEBCAST
Symantec Endpoint Protection Q & A with the Experts
WHEN: AVAILABLE ON DEMAND
SPONSOR: Symantec Corporation

The proliferation of laptops and desktops requires effective protection of your company's endpoints. This webcast discusses why endpoint security is a critical aspect of your company's security initiatives and looks at the Tolly Group's findings on endpoint protection tools.
VIEW WEBCAST
Calculating Cost Savings from User Provisioning - Forrester Consulting Analysis
WHEN: AVAILABLE ON DEMAND
SPONSOR: Oracle Corporation

With the current economic downturn, organizations need cost-effective and efficient strategies for improving compliance, security, and user productivity. This webcast and accompanying podcast provide expert best practices that can help your company reduce the burden on IT budgets by deploying user provisioning strategies.
VIEW WEBCAST DOWNLOAD PODCAST
View all Webcasts & Podcasts
Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.
  A B O U T   T H I S   A L E R T
TechTarget
Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

This e-newsletter is published by SearchSecurity.com, a targeted Web site from TechTarget, The IT Media ROI Experts and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
Copyright 2009 TechTarget. All rights reserved.

If you no longer wish to receive Webcast Alert from SearchSecurity.com go to unsubscribe: http://searchSecurity.techtarget.com/u?track=NL-100&em=sekhargreen%40gmail.com&uid=4946246&eid=690015&

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Hot in Week

Popular

Archive

item