RAI Data Center (RDC) is an IT and business services provider for the automotive and transport services organizations based in the Netherlands, Belgium and Luxemburg. RDC helps companies such as car dealers, lease companies, importers, garages, car washes and car rental companies work smarter and faster by providing web-based services that support cooperation between companies across the whole supply chain. This involves thousands of applications and services to which their customers need access; some of which RDC provides, while others come from other providers. Different providers mean different authentication processes with numerous usernames and passwords.
In this webinar, we discuss simple but powerful security monitoring tools and methods to provide interlocking layers of protection and preserve business agility.
As an information technology (IT) security professional your responsibility is to protect your organizational data from both outsiders and insiders. And you need to recognize when a compromise or breach is actually taking place. In this webcast, explore common practices for collecting, monitoring, and analyzing system log data. Discover different methods of identifying and monitoring privileged users. Find out how to detect unusual activity on business computing services, and learn why maintaining patch levels is so important.
Cloud, BYOD and other technologies are here to stay. Now that your business users have access to sensitive data and services “anytime, from anywhere”, what can you do to stay one step ahead of the security and compliance risks that come with a rapidly evolving threat and IT operations landscape? View this webcast to hear Renee Bradshaw, Senior Marketing Manager for Security Products at NetIQ, describe how implementing a continuous process for improving security and maintaining compliance is the right approach to mitigating risks to your sensitive data - wherever it resides.
This auditing and compliance session provides tips to improve your security and compliance efforts.
A look at how logs can assist you in determining compliance and finding new attacks as well as some of the typical pitfalls of logging that can lead to failures.
The team demos how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate your security across the enterprise and public cloud access, and increase executive visibility by providing your management with a comprehensive view.
To enhance security and streamline processes, GaVI used Identity Manager and Sentinel Enterprise to automate user account management for 22,500 + users.
To enhance the security of its IT environment, the Municipality of Siena implemented Sentinel Enterprise, Identity Manager and Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.
Adam Loughran, Compliance and Security Management Principal, describes the certified and integrated technologies that we and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Following the introduction of stringent new legislation in Italy related to ensuring data privacy, Sony Italia needed the ability to maintain auditable records of all logins to systems containing personal data. Working with H4T, a Partner, the company chose Sentinel Log Manager as the most cost-effective and functional solution to meet the new legislative requirements.
Join Jason Arrington, as he walks through the features of Sentinel Log Manager, including new features found in version 1.1.
Brian Singer talks with Randy Hardin, Lead Systems Engineer at the University of Dayton, about how they use Sentinel Log Manager to achieve compliance and enhance their security.
Featuring: Jerry Shenk and Jason Arrington. According to the recently released SANS log management survey, many organizations are now able to collect logs from many new sources, including systems and applications. However, organizations still find it difficult to derive real value from their log files. In this Webcast, experts from SANS will provide some best practice scenarios that will enable organizations to easily derive more value from log data. Don't get stuck with gigabytes of nearly worthless log files, unleash the information that your log data contains to improve security and simplify your compliance efforts.
Brian Singer, Jason Arrington and Pascal Oetiker highlight some of the innovative capabilities in Sentinel Enterprise and where it’s headed in the future.
Security Information & Event Management (SIEM) and regulatory compliance have become mission critical priorities as well as arduous tasks. Wipro, and Dave Shackleford show you how partnering with an IT security service provider can help manage security complexity, and put you on a path to compliance while reducing operating costs.
Demonstration on how Sentinel Enterprise and Sentinel Log Manager can keep your business safe from breaches.
Sentinel Log Manager, released in August 2009, marks a new direction for our Sentinel SIEM platform. In this review, SANS Analyst Jerry Shenk discusses how Sentinel Log Manager works as a standalone log management product against traditional pain points associated with log management, including collection, storage and reporting.
Join Leo Castro for this brief Q&A session. Learn how we and SAP are teaming up to provide enterprises with integrated compliance solutions (audio only).
In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.
Product Marketing Manager Brian Singer shows how easy it is to set up data collection with Sentinel Log Manager.
Jason Arrington, Product Manager for Sentinel Enterprise, provides an overview of what Sentinel Enterprise does and how it integrates with other Identity and Security products.
Forrester and NetIQ discuss collaboration market trends and NetIQ principles and strategy.
Learn about the security and vulnerability capabilities in Compliance Management solutions.
Watch this session to see a demonstration of the correlation and identity injection capabilities in Sentinel Enterprise. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.
Jason Arrington, Product Manager, provides an overview of the product.
In this program leading experts from featured analyst firm, Gartner, Inc., and opinion leaders from Infosys, explore the emerging trends in SIEM and provide crucial advice on how to use SIEM to enhance your security and compliance programs.
See a demo of Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.
Request a Call
Call or complete the form below.
* Required Fields