Item Details

Print View

Enterprise Security Landscape

Kanopy (Firm)
Format
Video; Streaming Video; Online
Summary
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices that will help IT and business professionals protect sensitive data and assets from a damaging cyber-attack. Track: Straight talk straightforward explanations of key technologies and their business value. Learning objectives: Explain the changing nature of security threats and cyber-attacks. Recognize if enterprises are "up to the challenge" in terms of protecting their infrastructure and data from security breaches and cyber-attack. Understand the emerging IT trends of cloud computing and big data and how they impact enterprise security.
Release Date
2012
Language
English
Notes
Title from title frames.
Published
[San Francisco, California, USA] : Kanopy Streaming, 2014.
Recording Info
Originally produced by SmartPros in 2012.
Publisher no.
1089901 Kanopy
Related Resources
Cover Image
Description
1 online resource (1 video file, approximately 36 min.) : digital, .flv file, sound
Mode of access: World Wide Web.
Technical Details
  • Staff View

    LEADER 02262ngm a22003731i 4500
    001 kan1089901
    003 CaSfKAN
    005 20140204133419.0
    006 m o c
    007 vz uzazuu
    007 cr una---unuuu
    008 140807p20142012cau036 o vleng d
    028
    5
    2
    a| 1089901 b| Kanopy
    035
      
      
    a| (OCoLC)897769728
    040
      
      
    a| UtOrBLW b| eng e| rda c| UtOrBLW
    245
    0
    0
    a| Enterprise security landscape.
    264
      
    1
    a| [San Francisco, California, USA] : b| Kanopy Streaming, c| 2014.
    300
      
      
    a| 1 online resource (1 video file, approximately 36 min.) : b| digital, .flv file, sound
    336
      
      
    a| two-dimensional moving image 2| rdacontent
    337
      
      
    a| computer 2| rdamedia
    338
      
      
    a| online resource 2| rdacarrier
    344
      
      
    a| digital
    347
      
      
    a| video file b| MPEG-4 b| Flash
    500
      
      
    a| Title from title frames.
    518
      
      
    a| Originally produced by SmartPros in 2012.
    520
      
      
    a| Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices that will help IT and business professionals protect sensitive data and assets from a damaging cyber-attack. Track: Straight talk straightforward explanations of key technologies and their business value. Learning objectives: Explain the changing nature of security threats and cyber-attacks. Recognize if enterprises are "up to the challenge" in terms of protecting their infrastructure and data from security breaches and cyber-attack. Understand the emerging IT trends of cloud computing and big data and how they impact enterprise security.
    538
      
      
    a| Mode of access: World Wide Web.
    650
      
    0
    a| Computer hackers.
    650
      
    0
    a| Cyberterrorism.
    650
      
    0
    a| Cloud computing.
    650
      
    0
    a| Big data.
    710
    2
      
    a| Kanopy (Firm)
    856
    4
    0
    u| http://proxy.its.virginia.edu/login?url=http://virginia.kanopystreaming.com/node/89902 z| A Kanopy streaming video
    856
    4
    2
    z| Cover Image u| http://proxy.its.virginia.edu/login?url=https://www.kanopystreaming.com/node/89902/external-image
    999
      
      
    w| WEB l| INTERNET m| UVA-LIB t| INTERNET
▾See more
▴See less

Availability

Google Preview

Google Books Preview