1. Zerto & 451 Group: Protecting Applications, Not Just Data


    from Zerto Added 147 0 0

    Learn more at http://www.zerto.com/vmware-application-protection-recovery/ and sign up for a free trial! Zerto's Jennifer Gill hosts 451 Group's Dave Simpson to talk about enterprise-class BC/DR in a VMware environment and how business can protect Tier 1 Applications instead of merely protecting data.

    + More details
    • Blending Privilege Vulnerability Management in 2014 with 451 Research Senior Analyst, Javvad Malik


      from BeyondTrust Added 71 0 0

      If your vulnerability management program is like most, you probably struggle to identify real, critical risks buried within massive amounts of data. During this webinar, Javvad Malik of 451 Research will discuss how to quickly discern and prioritize security exposures by aligning your vulnerability management (VM) and privilege management (PM) programs. You’ll learn how asset and user-based exposures are intertwined — and how establishing lines of communication between VM and PM operations delivers an effective gauge of relative risk. Javvad will walk attendees through: * Where privilege and vulnerability management fit into today’s threat landscape * Which asset and user data points are key to understanding and prioritizing vulnerabilities * What steps you can take to interconnect your privilege and vulnerability management processes This webinar is ideal for security professionals and IT experts seeking practical advice on finding and fixing the vulnerabilities that pose the biggest risk to their organizations.

      + More details
      • Turn Your Big Security Data into a Big Advantage


        from BeyondTrust Added 49 0 0

        Check out this online webinar from February 2012, co hosted by eEye Digital Security and 451 Research, featuring 451's Andrew Hay. This online webcast covers how today's enterprise IT and security teams can leverage their 'big security data' to make more informed decisions as to how to better protect their networks. For those of you who still have questions after watching the recording, please continue the conversation in the comments section on the eEye Blog here: http://eeye.co/451replay We’ll be sure to answer your questions in the order they’re received.

        + More details
        • Lessons from a Wise SaaS Provider - Telx MarketplaceLIVE West 2013


          from Telx Added 48 0 0

          Software as a Service is chalking up huge revenue growth, but ultimately depends on core infrastructure for its viability. Moreover, infrastructure and architecture ultimately contribute to the end customer experience, with numerous cost-performance trade offs such as between cloud and custom enterprise architectures and between consolidated and dispersed architectures. This panel will explore the evolution of SaaS in terms of best practices in infrastructure platforms and ecosystems such as SaaS aggregators and markets. Moderator: Dennis Callaghan, Senior Analyst, 451 Group Speakers: Antonio Piraino, Chief Technology Officer, ScienceLogic Arne Josefsberg, Chief Technology Officer, ServiceNow Kevin Dobbs, CEO, Montclare Dejan Deklich, Vice President of Cloud, Splunk Learn more about MarketplaceLIVE visit: www.telxmarketplacelive.com Learn more about Telx visit: www.telx.com

          + More details
          • Security In The Cloud Vs. Security For The Cloud


            from Layer 7 Technologies Added 22 0 0

            451 Group Senior Analyst Steve Coplan & Layer 7 CTO Scott Morrision discuss the key difference between security IN and security FOR the cloud in terms of technology & process; and the things you need to consider.

            + More details
            • Extending Enterprise Security into the Cloud


              from Layer 7 Technologies Added 14 0 0

              For years enterprises have invested in identity, privacy and threat protection technologies to guard their information and communication from attack, theft or compromise. The growth in SaaS and IaaS usage however introduces the need to secure information and communication that spans the enterprise and cloud. This presentation will look at approaches for extending existing enterprise security investments into the cloud without significant cost or complexity.

              + More details

              What are Tags?


              Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."