Protecting your critical data on a budget

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The threats your organisation now faces have grown significantly more dangerous in recent times.

At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared.

It's against this backdrop that you now need to defend against a rising level of security risks, often armed only with an ineffectual set of legacy security technologies.

Join us for am informative webinar that will explain how - with the right end point security systems in place - you can cost-effectively defend your organisation's IT resources against a rising tide of threats to its integrity.

This webinar will:

  • Help you understand how to re-engineer your legacy end-point defenses with a new, unified & comprehensive endpoint protection platform - spanning the cloud to the enterprise to the endpoint - to create a proactive security infrastructure.
  • Assist your IT staff in evaluating how to shore up your infrastructure against critical and rapidly shifting vulnerabilities
  • How to implement a converged security & systems management infrastructure that can deliver proven ROI while reducing risk.
  • Enable you to manage your entire endpoint estate - mobile or fixed, server or desktop, from a single pane of glass.
  • Dramatically increase your speed to comply with major Federal standards such as FDCC, ITIL, PCI, etc.,

This webinar is for:

  • IT security managers concerned about the vulnerability of their end-point IT systems and architecture.
  • IT staff wanting to better understand the problems and solutions available in the security marketplace.
  • Anyone wanting to improve their knowledge about the security
  • implications of cloud computing and an increasingly mobile workforce on IT management & Security
  • Anyone concerned with Compliance
  • Anyone interested in ROI for their Computing infrastructure

Speakers

Steve Gold

Infosecurity Magazine

John Maddison

Vice President Core Technology, Trend Micro - Alli

Mark Starry

Director, Enterprise Architecture and Security In

Amrit Williams

Chief Technology Officer, BigFix

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.