Date: Wednesday, May 30, 2018
Time: 1:00 p.m. EST / 10:00 a.m. PST
Cloud applications like Office 365, Salesforce and AWS have taken enterprise IT by storm. Some have embraced the cloud, creating corporate instances of these widely used platforms in order to maintain some control over cloud data. Others are wary of the security and compliance challenges posed by these new services. Enter cloud access security brokers or CASBs – purpose-built solutions that provide real-time data and threat protection for the cloud.
To date, hundreds of organizations in every major vertical have deployed CASBs as a means of addressing gaps in their security. In this webinar, presented by Rik Turner, analyst at Ovum, and Rich Campagna, CMO and SVP Products at Bitglass, we’ll explore real-world security use cases. Learn how your peers – in healthcare, financial services, tech, manufacturing and other industries – are leveraging next-generation technologies to achieve comprehensive control and visibility across all cloud platforms.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red). Press Register to complete your registration. If you have already registered for our site or for one of our webinars, you may login to register without re-entering your information.
A new paper shows that with the right amount of hardware and know-how, an attacker can spoof a vehicle's GPS system and change the route.
IDT CIO Golan Ben-Oni has faced down two serious cyberattacks in the last year and he expects more are on the way. From selecting vendors to thinking about the cloud, here's how Ben-Oi is rethinking the security landscape.
With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
The number of bug bounty programs continues to grow, and enterprise security is better for it. A new report urges more businesses to embrace and not squash these initiatives.
ARCHIVEDWhat You Can Do To Strengthen Security Over Your Clouds
Tuesday, June 26, 2018
1:00 p.m New York/ 6:00 p.m. London
ARCHIVED | August 31, 2017, 3pm EDT
An interview with Steve Grobman, CTO of McAfee
Tweets by Security_Now_
like us on facebook