Webinars On Demand

Avoidance vs. Response: Back to Security Basics

May 15, 2014

Review findings from the NTT Group 2014 Global Threat Intelligence Report (GTIR). The goal of the 2014 GTIR is to raise awareness for executives and security professionals of how to avoid high-profile information security and data breaches, while understanding the needs for a strategic approach to security and offering recommendations to compress the threat mitigation timeline.

Information Security: Options for Log Monitoring and Threat Detection

November 07, 2013

There are few things that are as important as keeping your data secure. The cost of a security breach can be high – not only in terms of money or sensitive data stolen, but in terms of regulatory non-compliance and loss of public reputation. Listen to this webinar for an analysis of the budgetary, operational and security impacts.

Security Monitoring and Alerting: MSSP vs. SIEM

September 16, 2013

The question of whether to have a Managed Security Service Provider (MSSP) manage your security infrastructure or purchase a Security Information and Event Management (SIEM) product and manage it yourself, can be difficult to determine on your own. This webcast identifies the pros and cons of an on-premise SIEM and an MSSP approach, as well as provides an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider.

2013 Global Threat Intelligence Report Review

March 21, 2013

Join Solutionary for an in-depth review of the findings from the 2013 SERT Global Threat Intelligence Report including: analysis methodology; real-world case studies; actionable recommendations.

Asset Management in a Consumerized World

September 28, 2012

Asset Management is a critical component to business. As we become more integrated into the cloud and as we embrace consumerization with open arms, what repercussions will this have on asset management? This session will explore how we manage our assets in the cloud amongst a growing culture of consumerization. This webinar is hosted by ISSA.

Contextual Security Provides Actionable Intelligence

June 26, 2012

Listen to the recorded session where Solutionary and SC Magazine discuss how a security foundation built on organizational, infrastructure and external context can elevate the information provided by both “Next Generation” and legacy security devices provides actionable intelligence – the ability to quickly and efficiently make fully informed security decisions. This webinar was hosted by SC Magazine.

Enhancing Security with Application Control and Context

November 30, 2011

A successful security program keeps attackers out while delivering business value. Join Accuvant, Palo Alto Networks and Solutionary for an informative webinar to discuss how adding context to security helps thwart malicious applications and content.

Advanced Persistent Threat Series

June 14, 2011

APT attacks can have a significant impact on everyone, not just the ultimate targets. Listen to this four-part series to learn what they are, how they affect you, and ways to protect against them.