Managed SEP

Managed SEP

Learn More
IT Maturity

IT Maturity | An Assessment Led Approach

Learn More
A Better Approach to DLP

A Better Approach to DLP

Learn More

07 July

Webinar | Identity and Access Management Workshop [IAM]

Assessing, Simplifying, and Integrating IAM Ransomware, data breaches, and password leaks are dominating the headlines in 2016. In 2015 there…

View more
13 June

Webinar | Vulnerability Management Workshop

Crash Course: Tools & Skills for Vulnerability Management Implementing Vulnerability Management tools and testing are essential for maintaining a solid…

View more
29 April

Webinar | Real-Time Risk Management

Better IT Security Thru Prioritization and Automation Finding and closing security vulnerabilities can be a daunting task for most IT…

View more
22 April

Webinar | Keys to Building a Data-Centric Security Posture

Defending Compromised Data The enemy is knocking at the gate, the hardest questions for security teams today is which gate…

View more


EncodeDecode

Hacker defense against the dark arts

 

EncodeDecode

 


17 March

Responding to Sophisticated Social Engineering & InfoSec Attacks

Industry: Manufacturing Solutions: Social Engineering Patti Engineering, a CSIA Certified control systems integration company offering high-caliber engineering and software development…

View more
18 July

eDiscovery Managed Services

Industry: Utility Solutions: Symantec Clearwell (eDiscovery) Utility companies deal with a vast amount of regulatory oversight and mounds of associated…

View more
12 August

Enhancing Security Through Custom Symantec Solutions Suite

Industry: Healthcare Solutions: Symantec™ Control Compliance Suite Symantec Data Loss Prevention Symantec Mobile Device Management As a health services provider,…

View more
14 September

Protecting IP with SEP

Industry: Manufacturing Solution: Symantec™ Endpoint Protection Prior to contacting CBI, the client had reached a stalemate with its previous network…

View more
Malware found pre-installed on some Android devices https://t.co/uXZlORJiWk https://t.co/rNITSLIVX5
Companies have increasing confidence in the cloud and its security capabilities #InfoSec #CloudSecurityhttps://t.co/hg14AWsIDb
Malware, adware, hidden apps & other risks make more than 20 million mobile devices susceptible for attacks… https://t.co/kEmikW1i3t
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/421bePLUf7 https://t.co/yB59wTELZo
Why small-business owners are easy prey for hackers #InfoSec https://t.co/70i2Zl7MDi https://t.co/1RgbSdRL1X
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/zsUACHzdLq
When #Ransomware hits, should a company pay up? https://t.co/XrsBj5G12H https://t.co/DaXCsNoSnA
Who's responsible for disclosing new security vulnerabilities? #InfoSec https://t.co/BTM4lHy6i1 https://t.co/yUIHUsidDp
#ShadowIT continues to expand in organization's environments. Learn more about the risks #InfoSechttps://t.co/GDzYmDjdhc
Why small-business owners are easy prey for hackers #InfoSec https://t.co/HgxAcbSk0Q https://t.co/Jxtstjkcqp
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/J9JN4XGgGZ
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/ClUE788hbx
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/25KYcHYwy6
CBI & @IBMSecurity have teamed up once again to bring Proof of Technology events to a city near you throughout 2017… https://t.co/SdFVuLD849
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/uZjPFeF3hC
#IoT devices continue to expand within organizations. Let's see how organizations hold themselves accountable… https://t.co/GGXfafItLR
#ApplicationSecurity continues to evolve as security teams uncover hidden vulnerabilities #InfoSechttps://t.co/jRBAP3dM5I
#ShadowIT continues to haunt the threat landscape in Cloud security #InfoSec https://t.co/v0VPU98G9L https://t.co/l74YUhZLgY
What are the top three threats CISOs can't yet handle? https://t.co/nPsqH4fqzc https://t.co/atM6whVMeu
Rogue apps plague IT teams. Knowing how many applications are really on your network is crucial #InfoSechttps://t.co/aNFRXz9bHu