data security tagged posts:

Why Security is Priority Number One for Any Cloud Service

October 22nd, 2019 |
Why Security is Priority Number One for Any Cloud Service

With the average cost of a data breach for a company now at $3.8 million and the emergence of regulations like GDPR and the CCPA, businesses have more than customer distrust to contend with if their data is not [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Security, Tech Barometer - From The Forecast by Nutanix Tags: , , , , , ,

HyTrust, IBM and Intel Remove Security Barriers for Cloud Adoption – Intel Chip Chat – Episode 535

HyTrust, IBM and Intel Remove Security Barriers for Cloud Adoption – Intel Chip Chat – Episode 535

In this Intel Chip Chat audio podcast with Allyson Klein: Bill Hackenberger, Vice President of Data Security at HyTrust, joins us to talk about security with virtualization and across cloud environments. HyTrust has been securing virtualized environments for enterprises [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security, virtualization Tags: , , , , , , , , , , , ,

Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

September 2nd, 2015 |
Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

In this Intel Chip Chat audio podcast with Allyson Klein: Alan Ross, Senior Principal Engineer at Intel outlines how quickly the amount of data that enterprises deal with is scaling from millions to tens of billions and how gaining [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Intel, Intel Chip Chat Tags: , , , , , , , , , ,

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Intel Chip Chat: Network Insights: Edward Pullin, Product Line Manager at Intel, stops by to discuss Intel QuickAssist Acceleration Technology for security and compression. He describes how the technology is helping Telecommunication organizations secure their data whether in motion [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights Tags: , , , , , , , ,

Fujitsu Spain: Revolutionizing Public Administration

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: , , , , , , ,

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |

Vision 2008 Podcast: Next Generation Data Protection

Vision 2008 Podcast: Next Generation Data Protection

In this podcast, Matt Kixmoeller, VP of Product Management for Veritas NetBackup and Pat Hanavan, VP of Product Management for Backup Exec, have a high-level discussion around Symantec’s Next Generation Data Protection strategy. For more information, visit the business section [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Symantec Tags: , , , , , , , ,

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

In this podcast, Marty Ward, Director of Product Marketing in the Data Protection group, discusses the updated NetBackup platform, and how it is a part of Symantec’s Next Generation Data Protection strategy. For more information, visit the business section at [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Symantec Tags: , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.

This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , ,