Feeds

Security: Survive the attack of the known unknowns

And keep your eye on the Ts&Cs

  • alert
  • submit to reddit

Security for virtualized datacentres

Live today Some vendors will tell you that security problems are solved by sticking a device on the edge of your network, but we all know that 100 per cent security is a fantasy.

You will be attacked by both known and unknown threats, and some of those attacks will be successful. This means that recognising the signs of an attack quickly – and being able to limit the effect on your business when those attacks succeed – is fundamental to your security policy.

Raimund Genes from Trend Micro will be in the studio to describe the nature of threats today and how we should be managing them. He's joined by The Dark Lord, Tony Lock, who returns to the studio to fill us in on how the Reg audience is coping with the known unknowns of security.

Whether it's a Magic Kitten or the Second Bureau of the People's Liberation Army's General Staff Department's Third Department which is attacking you, it is how you protect yourself that counts.

Join us live today at 13:00 BST for this Regcast, to see how our experts can help you survive the attack of the known unknowns.

Sign up and watch this live event here.

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.