Безопасность

217 роликов Предотвращение утечки данных, DLP Data Loss Prevention - DLP - ПО для предотвращения утечек конфиденциальной информации/данных.

Предотвращение утечки данных, DLP

307 роликов Антивирусное ПО

Антивирусное ПО

Обеспечение информационной безопасности, борьба с киберпреступностью. ИТ-безопасность.
HD 00:04:30
Check Point: Anti-Ransomware: Solution Brief & Demo | Tech Bytes
Anti-Ransomware protects against sophisticated zero-day ransomware. It is included in SandBlast Agent. More information: Protect endpoints from sophisticated attacks and zero-day threats, enabling a deep understanding of security events f...
Cмотреть видео
HD 00:02:06
Check Point: Helvetia Insurance : vSEC for NSXの導入事例
スイスで3番目に大きな保険会社Helvetia InsuranceのvSEC for NSXの導入事例です。保険とは信頼の上に成り立つビジネスなので、お客様の満足度は特に重要であり、セキュリティ対策に求めらるレベルも非常に高いです。ハイレベルなニーズに応えたのがチェック・ポイントのvSEC for NSXでした。 For more information:
Cмотреть видео
HD 00:18:47
Check Point: Gil Shwed & Marius Nacht Interview - Milan 2017
Gil Shwed & Marius Nacht discuss product innovation and the Experience over the years. For more information:
Cмотреть видео
HD 00:24:49
Check Point: Welcome to the Future of Cyber Security | Infinity
The future of cyber security is here. Learn and stay protected against today's cyber threat landscape. For more information: We are all living in a connected world which is affecting every aspect of our lives. In the past couple of ye...
Cмотреть видео
HD 00:26:30
Check Point: Infinity | The Cyber Security Architecture of the Future
Gabi Reish - VP, Product Management and Product Marketing, Software For more information on the Cyber Security Architecture of the Future, please go to:
Cмотреть видео
HD 00:17:56
Check Point: Hacking the Smartphone | Mobile Cyber Hack Demonstration
Live demonstration of a smartphone hack, from Experience 2017. For more information visit: Watch Michael Shaulov, Head of Mobility Products at Software hack a smart phone in real time. Today every business is a mobile business, with req...
Cмотреть видео
HD 00:19:46
Актив: Вебинар «Рутокен ЭЦП для западных алгоритмов электронной подписи»
В рамках вебинара рассмотрены темы: — Типичные сценарии использования RSA; — Как Рутокен реализует RSA; — В каких моделях Рутокен аппаратно реализован RSA; — Как применять Рутокен в типичных сценариях использования RSA; — Как легко завести ...
Cмотреть видео
HD 01:16:29
Код Безопасности: Защита АРМ в соответствии с приказами ФСТЭК №17 и №21 с помощью Secret Net Studio
Ведущий: Бойцов Иван, ведущий менеджер по продукту компании «Код Безопасности» Вебинар будет интересен специалистам по информационной безопасности в государственных и коммерческих организациях на этапе выбора или внедрения комплексной защит...
Cмотреть видео
HD 00:18:41
Check Point: Cloud Security: Safe Journey to the Cloud
The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. For more information visit: But cloud carries a totally new and unique set of security challenges. In th...
Cмотреть видео
HD 00:04:47
Check Point: R80.10 SmartConsole Security Policies View | Threat Prevention
This video is an overview that describes important features and functionality of the R80.10 SmartConsole and focuses on: Unified Access and Threat Prevention Policies Example of inline layers for zone-based policy Using multiple blades in o...
Cмотреть видео
HD 00:05:27
Check Point: Start Building Your Unified Policy with R80.10 | Security Management | Tech Bytes
R80.10 policy management is unified so you can create and monitor these policies harmoniously. One single policy manages your users, devices, applications, data and networks. With this unified policy, you also get unparalleled granular cont...
Cмотреть видео
HD 00:00:19
GroupIB: Group IB CyberCrimeCon 2017
Узнавайте об угрозах, утечках, взломах и хакерской активности до того, как они смогут вам навредить. Российский поставщик Threat Intelligence, вошедший в топ мировых рейтингов Gartner, IDC и Forrester.
Cмотреть видео
HD 00:18:22
Check Point: Simple Security Is Your Best Bet
Patrick Woods, CISO, Missouri State Highway Patrol This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a sim...
Cмотреть видео
 00:19:02
Check Point: Evolving Role of the CISO - A Customer Story
In this session, CISO Joey Smith will discuss his understanding of the importance of compliance and security and their differences. For more information: Additionally, he will review what he has personally learned from his experience as...
Cмотреть видео
HD 00:27:09
Check Point: Shedding Light on the Dark Web
Avi Rembaum + Neatsun Ziv The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of ...
Cмотреть видео
HD 00:18:31
Check Point: Cyber Security in the Era of Exponential Technology
Amnon Bar-Lev - President, Software We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computin...
Cмотреть видео
HD 00:20:33
Check Point: We Make Jeans; How Hard Can That Be?
This talk will present some of the business challenges, experiences and road maps from a security perspective to protect the global Levi Brand. Steve Zalewski, Chief Security Architect, Levi Strauss For more information:
Cмотреть видео
HD 00:16:07
Check Point: Moving to the Public Cloud, Securely - FireChat with AWS & Azure
More than 70% of the organizations are committed to a cloud strategy in 2017. Businesses are moving their applications to the Cloud to gain more agility and efficencies. At the same time, Cloud security remains their top concern. Customers...
Cмотреть видео
HD 00:19:49
Check Point: What To Do When It Happens to You - Incident Response
Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and w...
Cмотреть видео
HD 00:24:54
Check Point: Preventing the Ransomware Plague | Ransomware Protection
Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming t...
Cмотреть видео
HD 00:23:46
Check Point: Choosing The Right Security Architecture | Cyber Security | Network Security
Moti Sagey - Head of Strategic Marketing & Intelligence, Software When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars th...
Cмотреть видео
HD 00:01:57
Check Point: Anti-Ransomware vs WannaCry | Ransomware Protection Demonstration
WannaCry ransomware hits more than 75,000 organizations in over 99 countries and is quickly spreading. Here's how you can prevent ransomware attacks against your organization with SandBlast Agent, Anti-Ransomware. For more information on h...
Cмотреть видео
HD 00:04:32
Check Point: R80.10 Security Management | Tech Bytes: Gateways, Logs, and Manage & Settings
This video is an overview that describes important features and functionality of the R80.10 SmartConsole. More information: To learn more about R80.10 Security Management: Infinity is the only fully consolidated cyber security architec...
Cмотреть видео
HD 00:23:59
Актив: Вебинар «Рутокен: понятный, безопасный, надежный»
Вебинар посвящен продуктам и решениям в области аутентификации, защиты информации и электронной подписи под брендом «Рутокен».
Cмотреть видео
HD 00:11:59
Check Point: Introducing Anti-Ransomware: Defeat Cyber Extortion
Did you know ransomware hit 1 in 3 businesses during 2016? Today more than ever you need a new way to effectively prevent ransomware from impacting your organization. Watch our webinar replay to learn how you can automatically detect, block...
Cмотреть видео
HD 00:01:25
Check Point: Advanced Cyber Security for 2018 | Infinity
Learn more at Introducing Infinity, the world’s most advanced cyber security and management architecture. Infinity consolidates security across network, cloud and mobile, keeping you secured from known and unknown threats, today and in ...
Cмотреть видео
HD 01:03:18
Check Point: and Tufin: Security Management for the Future | Enterprise Network Security
and Tufin provide complete, simplified and automated security management for the enterprise network of the future. For more information: Together, the Tufin Orchestration Suite with Firewalls and Security Management products provide ad...
Cмотреть видео
HD 00:08:15
Layta: Монтаж электронной проходной PERCo KTC01
Монтаж и ввод в эксплуатацию электронных проходных PERCo KTC01. #СКУД #Электронная_проходная #PERCo
Cмотреть видео
HD 00:01:05
Layta: Презентация Macroscop
Презентация бренда Macroscop #Видеонаблюдение #Macroscop
Cмотреть видео
HD 01:01:06
ДиалогНаука: DeviceLock - экспертный взгляд на DLP-технологии
На вебинаре проведен обзор основных аспектов утечки конфиденциальных данных и методов противодействия утечкам, предлагаемых рынком информационной безопасности - решениям класса Data Leak Prevention, а также будут рассмотрены вопросы эффекти...
Cмотреть видео