Harness the Power of Big Data
Today’s competitive battleground is fueled by the increase in volume, velocity and variety of structured, semi-structured and unstructured information. Return on Information will help organizations drive better return from 100% information
Use the drop-down menus to filter the videos
Loading, please wait...
Identifying Vulnerabilities - Abraham Kang
Having security intelligence means the ability to understand and discern vulnerability patterns across different platforms. Let's take a look at privilege escalation...
Three Big Threats of 2013 - Prajakta Jagdale
Three Big Threats of 2013
Mobile Malware - Frank Hsueh
Software Security Goes Mobile - Katrina O'Neil
Software Security Goes Mobile
HP provides Software Security to Acxiom
Hear from Brenton Witonski, an IT Security Analyst with Acxiom, about what makes a successful software security program: leadership buy-in, effective relationships w...
HP provides Application Security for The LDS Church
Hear from David Kosorok, an Application Security Expert with The LDS Church, about how they use HP products like HP Fortify and HP WebInspect to find vulnerabilities...
HP provides security solutions to Heartland Payment Systems
Hear from Ashwin Altekar, the Director of Enterprise Risk Management for Heartland Payment Systems, about how they use HP products like HP Fortify to help identify s...
TELUS - HP Software Video
TELUS, a leading provider of managed security solutions in Canada, shares how HP ArcSight delivers the platform for intelligent analysis and forensics capabilities t...
Paychex - HP ArcSight Video
Paychex shares how HP ArcSight enables them to protect their business, make sense of massive amounts of data, and ultimately focus on the important events that happe...
从一开始就加强 IT 安全
IT 安全分析师 Brenton Witonski 解释了 Acxiom 如何通过自动化和协作方式，在应用层面灌输实施真正的安全措施思想。
기초부터 IT 보안 개발
IT 보안 분석가인 Brenton Witonski가 Acxiom이 애플리케이션 수준에서 진정한 보안을 구현하기 위해 어떻게 자동화하고 협업하는지 설명합니다.