Безопасность

217 роликов Предотвращение утечки данных, DLP Data Loss Prevention - DLP - ПО для предотвращения утечек конфиденциальной информации/данных.

Предотвращение утечки данных, DLP

307 роликов Антивирусное ПО

Антивирусное ПО

Обеспечение информационной безопасности, борьба с киберпреступностью. ИТ-безопасность.
HD 01:22:05
ДиалогНаука: Вебинар. Мониторинг событий ИБ на базе HP ArcSight
Вебинар на тему «Практические аспекты реализации мониторинга событий информационной безопасности на базе решений HP ArcSight ESM и HP ArcSight Logger». Спикер: Родион Чехарин
Cмотреть видео
HD 00:01:36
Check Point: RSA Conference 2014 - Customer & Partner Insights- Contra Costa Community College Distr
speaks with customers and partners at RSA Conference 2014 in San Francisco. Watch as they share what makes them a fan.
Cмотреть видео
HD 00:01:00
Check Point: RSA Conference 2014 - Customer Insights - Florida Power & Light
speaks with customers and partners at RSA Conference 2014 in San Francisco. Watch as Wanjiru Allen of Florida Power & Light talks about 's management and ease of use. She also shares what makes her a fan.
Cмотреть видео
HD 00:01:32
Check Point: RSA Conference 2014 - Customer Insights - Verisight
speaks with customers and partners at RSA Conference 2014 in San Francisco. Watch as Jaime Lopez of Verisight shares what makes him a fan.
Cмотреть видео
HD 00:01:27
Check Point: RSA Conference 2014 - Partner Insights - Blue Coat Systems
speaks with customers and partners at RSA Conference 2014 in San Francisco. Watch as partner Blue Coat Systems speaks about issues like Cloud Security and Cost of Performance affecting her customers. She also shares why she's a fan.
Cмотреть видео
 00:02:02
Check Point: CeBIT Global Conferences - Interview with Amnon Bar-Lev, Software Technologies
For five days of the year, CeBIT is the pulsing heart of the digital industry. More than 4,000 companies from over 70 countries showcased the latest innovations from the high-tech sector. Get more information about CeBIT at !
Cмотреть видео
HD 00:01:44
Check Point: Customer & Partner Insights- California DMV
partners with hundreds of companies across the U.S. and internationally to form long-term business and person relationships. To learn more: speaks with customers and partners at RSA Conference 2014 in San Francisco. Watch as they share w...
Cмотреть видео
HD 00:05:24
Check Point: : Introducing Software-defined Protection | Cyber Security Software
To address today’s EVER-CHANGING threat landscape, has introduced a MODULAR and dynamic security architecture that envisions a THREE-LAYER infrastructure that provides operational RESILIENCE and real-time, PROACTIVE protection.
Cмотреть видео
 00:02:42
GroupIB: Компьютерный вирус "Картоха"
Илья Сачков о компьютерном вирусе «Картоха», который помог хакерам похитить данные 110 миллионов пользователей кредитных карт в США
Cмотреть видео
 00:03:15
GroupIB: Хакерская атака на камеры видеонаблюдения ГИБДД
В результате хакерской атаки на камеры видеонаблюдения ГИБДД уже несколько суток подряд не работают камеры слежения на дорогах в Подмосковье. Илья Сачков, генеральный директор компании Group-IB, прокомментировал этот инцидент журналистам п...
Cмотреть видео
HD 00:04:19
Check Point: SMB Cyber Security - 600 Appliance Setup
Small businesses need cost-effective security that provides robust protections and ease of use. For more information: brings its long-standing history of security expertise to a range of solutions optimized for the unique demands of smal...
Cмотреть видео
HD 00:27:18
ЭЛВИС-ПЛЮС: Ограниченность функционального предназначения единого пространства доверия - видео
На 7-й конференции «Обеспечение безопасности информации в корпоративных информационных системах. Теория вопросов, практика решений», проводимой нашей компанией, А.П. Баранов, Заместитель Генерального директора ФГУП ГНИВЦ ФНС России, рассказ...
Cмотреть видео
HD 00:03:53
Check Point: Software - 20 Years of Innovation
An overview in pictures of key milestones in 's 20 year history
Cмотреть видео
HD 00:01:46
Check Point: Introducing ThreatCloud Emulation Services | Cloud Security
Learn More: Find Zero-Day Threats before they find you with ThreatCloud Emulation Services.
Cмотреть видео
HD 00:05:29
Check Point: Next Generation Firewall, How To Choose The Right One | Network Security
What questions should you ask when choosing the right network security protection in an integrated next generation firewall platform? For more information: provides customers of all sizes with the latest data and network security protect...
Cмотреть видео
HD 00:02:58
Check Point: Customer Success Video: MLB Network Maintains 100 Percent Network Uptime
The MLB Network turns to to help launch the cable network and achieve 100 percent uptime. 's easy, flexible and scalable security solution enables the MLB Network to maintain zero downtime and address the needs of its viewing fans in 70 m...
Cмотреть видео
HD 00:20:08
ЭЛВИС-ПЛЮС: Что нового в «ЗАСТАВА 6»? - видео
Игорь Шитов, менеджер продукта «ЗАСТАВА», в рамках своего выступления на InfoSecurity Russia 2013 рассказал об основных изменениях, произошедших в семействе продуктов «ЗАСТАВА 6» по сравнению с предыдущей версией. Презентация выступлен...
Cмотреть видео
HD 00:06:03
Check Point: Compliance Software Blade - Regulatory Compliance
For more information: This is the third video in the Compliance Software Blade Demonstration Series. See how the Compliance Software Blade can help you easily review your regulatory compliance status, and quickly prepare detailed reports ...
Cмотреть видео
HD 00:02:38
Check Point: Your Second Pair of Eyes - Compliance Software Blade | Network Security
For more information: Keeping a close eye on security and compliance is a challenging task. The Compliance Software Blade can be your second pair of eyes to constantly monitor your security status, save time in preparing audits and compl...
Cмотреть видео
HD 00:04:24
Check Point: - CNN Report a Gil Shwed (sub español)
CNN analiza en este informe la creación de Gil Shwed, , una empresa dedicada a la creación de soluciones en el ámbito de la seguridad informática.
Cмотреть видео
HD 00:02:22
GroupIB: Подробное описание механизма работы поддельных POS-терминалов.
Данное видео с подробным описанием работы мошеннических POS-терминалов было обнаружено экспертами Group-IB на просторах сети Интернет. Специалисты призывают граждан РФ, быть предельно осторожными.
Cмотреть видео
HD 00:03:59
Check Point: Threat Emulation Explained by | Advanced Threat Prevention
's Threat new Threat Emulation Software Blade prevents infections from undiscovered exploits, zero-day and targeted attacks. For more information: 's Threat new Threat Emulation Software Blade prevents infections from undiscovered exploit...
Cмотреть видео
HD 00:03:59
Check Point: Threat Emulation Explained by | Advanced Threat Prevention
's Threat new Threat Emulation Software Blade prevents infections from undiscovered exploits, zero-day and targeted attacks. For more information: 's Threat new Threat Emulation Software Blade prevents infections from undiscovered exploit...
Cмотреть видео
HD 00:15:01
Check Point: Do You Know What's Hiding On Your Network?
This video summarizes the analysis and findings in the 2013 Security Report. For more information: provides organizations of all sizes with the latest data and network security protection in an integrated next generation firewall platfo...
Cмотреть видео
HD 00:15:01
Check Point: Do You Know What's Hiding On Your Network?
This video summarizes the analysis and findings in the 2013 Security Report. For more information: provides organizations of all sizes with the latest data and network security protection in an integrated next generation firewall platfo...
Cмотреть видео
HD 00:03:11
Check Point: Choose the Right Next Generation Firewall - Multi-Layer Security
Why Multi-Layer Security and how 's Software Blade Architecture is the most secure and scalable solution in this market. For more information: provides organizations of all sizes with the latest data and network security protection in a...
Cмотреть видео
HD 00:03:11
Check Point: Choose the Right Next Generation Firewall - Multi-Layer Security
Why Multi-Layer Security and how 's Software Blade Architecture is the most secure and scalable solution in this market. For more information: provides organizations of all sizes with the latest data and network security protection in a...
Cмотреть видео
HD 00:04:08
Check Point: ThreatCloud | Complete Cyber Security Intelligence Infrastructure | Network Security
For more information: Introducing ThreatCloud, the first collaborative network to fight cyber-attacks.
Cмотреть видео
HD 00:04:23
Check Point: SmartEvent | Security Management Walk-Through
Are you tired of managing security by manually searching through millions of logs to find the information you need? There is a better way! Watch this SmartEvent Video to learn how to manage your security more efficiently. For more informa...
Cмотреть видео
 00:43:43
Check Point: Q&A: Compliance and Regulations with Jeremy Kaye | Network Security Risk and Compliance
For more information: On June 18, 2013, 's in house #regulations and #compliance expert Jeremy Kaye spoke with Dameon Welch-Abernathy live in our first Google+ Hangouts on Air. This was an opportunity to hear some of the challenges your p...
Cмотреть видео
← Предыдущая Следующая → Первая 61 62 63 64 65 66 67
Показаны 1891-1920 из 1996