Security tagged posts:

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (The Blueprint in Various Industries)

This is Part Three of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Operational and Strategic Elements of the Blueprint)

This is Part Two of the second episode of the The “Building Confidence in Enterprise Security” video [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.

This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , ,

PCI: What Does It Mean for You?

February 13th, 2008 |
PCI: What Does It Mean for You?

In this podcast, Barbara Mitchell, product manager for Verizon Business, provides valuable insight on the Payment Card Industry Data Security Standard, better known as PCI. She explains what the PCI Data Security Standard means for businesses and who is [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Verizon Business Tags: , , , , , , , ,

IT Risk Management Report, Volume 2: Part Three

February 7th, 2008 |
IT Risk Management Report, Volume 2: Part Three

This is the final segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide insights on vertical markets and key findings [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , ,

IT Risk Management Report, Volume 2: Part Two

February 7th, 2008 |
IT Risk Management Report, Volume 2: Part Two

This is the second segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide a general overview and key findings of [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , ,

IT Risk Management Report, Volume 2: Part One

February 6th, 2008 |
IT Risk Management Report, Volume 2: Part One

This is the first segment of a 3 part podcast interview with Darren Thomson and Jeremy Ward on the Symantec IT Risk Management Report, Volume 2. In this segment, Thomson and Ward provide a general overview and key findings of [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , ,

Building Confidence in Enterprise Security

December 12th, 2007 |
Building Confidence in Enterprise Security

The “Building Confidence in Enterprise Security” video webcast series, featuring Samir Kapuria and André Gold, addresses various topics related to enterprise security. Together, they use Symantec’s Security Blueprint as a lens for examining topics that include: IT compliance, IT risk [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , ,

Adelphi University Helps Faculty and Students Foster Collaboration Securely

November 19th, 2007 |
Adelphi University Helps Faculty and Students Foster Collaboration Securely

In this podcast, we hear from Verizon Business customer, Jack Chen, Chief Information Officer for the Office of the Provost for Adelphi University in Garden City, New York. Mr. Chen discusses how collaboration is at the heart of the university [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Verizon Business Tags: , , , , ,

Security with Manny and Malcolm of HP and Intel

October 25th, 2007 |
Security with Manny and Malcolm of HP and Intel

What’s new in security? In this podcast Intel’s Malcolm Harkins and HP’s Manny Novoa chat about the latest issues in security technologies, notably the emergence of hardware assisted virtualization. They also discuss, with PodTech’s Jason Lopez, coping with zero-day threats [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, HPE - Hewlett Packard Enterprise, InfoWorld, Intel, Intel-OpenPort Tags: , , , , , , , , ,

Symantec Vision 2007 Conference Preview: An Interview with Kevin Murray

In this Symantec podcast, Sr. Director of Endpoint Security Product Marketing, Kevin Murray provides an overview of the Endpoint Security general session for the Symantec Vision 2007 Conference. Visit www.symantec.com/vision for more information or to register. [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , ,

Data Center Migration: 4 Models for IT Integration

May 25th, 2007 |
Data Center Migration: 4 Models for IT Integration

With many data centers built more than a decade ago, facilities no longer fit current and future requirements from a business perspective. In addition, security requirements have evolved exponentially along with capacity issues like power and space shortages. Join BearingPoint [See the full post…]

Download Audio FileListen/download audio  

Categories: BearingPoint, Connected Social Media, Corporate, Enterprise 2.0 Tags: , , ,

Symantec Vision 2007 Conference Preview: An Interview with Don Kleinschnitz

In this podcast, VP of Recovery, Access, Provisioning and Security at Symantec Corporation, Don Kleinschnitz provides an overview of the Windows Protection track the Symantec Vision 2007 Conference. For more information, visit:

www.symantec.com/vision [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , ,

Exploring Virtual Servers and Application Security with F5

May 15th, 2007 |
Exploring Virtual Servers and Application Security with F5

At RSA 2007, F5 Networks Brian Hatch builds a virtual server in minutes with F5’s BIG-IP Local Traffic Manager, and F5 Technical Marketing Manager Alan Murphy talks security and network application delivery. [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Enterprise 2.0, F5 Networks Incorporated Tags: , , , , ,

Enterprise Security: Managing the Windows Vista Migration

In this Symantec podcast: As organizations move to Windows Vista, they’ll need a migration strategy that keeps conflicts and system disruptions in check, minimizes user downtime and inconvenience, and doesn’t expose systems to security threats. [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec Tags: , , ,

SNWSpotlight PM – Tuesday, April 17th, 2007

April 17th, 2007 |
SNWSpotlight PM – Tuesday, April 17th, 2007

SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego.

In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, SNWSpotlight Tags: , , , , , , , , ,

Secure Remote Access, F5 Networks’ Peter Silva, Part 1

March 22nd, 2007 |
Secure Remote Access, F5 Networks’ Peter Silva, Part 1

As corporations expand and adapt to a mobile workforce, issues of remote access and security have become even more crucial to basic business operations. Peter Silva, a technical marketing manager at F5 Networks, talks about secure remote access and [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, F5 Networks Incorporated, Technology Tags: , , , ,

Security Response Blog

A Symantec Security Response podcast featuring the top blog postings from Symantec Security Response engineers in Janaury 2007. This podcast features blog summaries from Amado Hidalgo, Eric Chien, Dave Cole, Elia Florio, Greg Ahmad & Han Lau.

More information at: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , , , , , , ,

Symantec Blog Roundup

January 18th, 2007 |

A Symantec Security Response podcast featuring two high-profile zero day vulnerabilities affecting Microsoft and the Broadcom Wireless device driver set. This podcast features a technical discussion of the vulnerabilities and offers listeners insight on likely attack scenarios and mitigating strategies. [See the full post…]

Download Audio FileListen/download audio  

Categories: Artificial Intelligence, Connected Social Media, Corporate, Security, Symantec, Technology Tags: , , , , , , , , ,

October Blog Roundup

December 15th, 2006 |

A Symantec Security Response podcast featuring a roundup of the top weblog postings from Symantec Security Response engineers in October. This podcast features a summary of weblogs from Jonathan Omansky, Orla Cox, Candid Wueest and Josh Harriman.

More information at: [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Security, Symantec, Technology Tags: , , , , , ,

Symantec Mail Security for Microsoft Exchange

November 27th, 2006 |

General overview of Mail Security for Microsoft Exchange: key features, competition, and FAQ.

More information at:

Symantec.com

Click here for transcript.

[See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: , ,

Introducing Norton Confidential

November 20th, 2006 |

This podcast provides an introduction and overview to Symantec’s new transaction security product, Norton Confidential.

More information at:

Symantec.com

Click here for transcript.

[See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Symantec, Technology Tags: ,

Gaming Threats

November 7th, 2006 |

A Symantec Security Response podcast focused on information-stealing programs designed to gather account information for online games. The goal of this podcast is to help you better understand the threats these programs pose to more than just your online game [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, E3 - Electronic Entertainment Expo, Gaming, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Historical Evolution

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and the historical evolution of threats reported by Symantec over the past 4 years. The goal of this podcast is to provide the listener with an [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,

Internet Security Threat Report, Vol. X: Future Watch

September 29th, 2006 |

A Symantec Security Response podcast focused on the Internet Security Threat Report Volume X and Symantec’s predictions on Future Threats. The goal of this podcast is to provide the listener with an overview of the some of the possible threats [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Security, Symantec, Technology Tags: , ,