Intel Security

Intel Security Connected Webcast Series

Intel Security Innovation Alliance partners deliver joint solutions that address the customers' most critical needs. This expanded portfolio of solutions is part of an integrated security system which helps protect, detect, and correct threats faster and more effectively than any single solution.

In this webcast series, you will learn how security ISVs work with Intel Security to help customers maximize current investments, lower operational costs, and reduce time to resolution. Each webcast highlights the unique key aspects and value of a “McAfee Compatible” Intel Security partner’s joint solution.

You will be required to complete a one-time registration. BrightTALK provides webinars and videos for professionals and their communities. You will need to subscribe as a member to the Intel Security Connected Channel in order to view the replay webcasts.

TitleDescriptionLive/On Demand*
Database Security: Don’t Forget to Lock the Back Door
Intel Security and Vormetric
Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring and McAfee Enterprise Security Manager to extend data-security coverage. Vormetric adds another layer of security to McAfee Database Activity Monitoring by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption. Register
Mobile and Cloud Computing with McAfee Enterprise Security Platform
Intel Security and Topia Technology
Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze, and share documents from a mobile device or a cloud computing platform. Register
User-Driven Classification: Adding a New Dimension to McAfee DLP
Intel Security and Boldon James
The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of decision making, system effectiveness, and reduces false positives. Register
Moving Beyond The Blacklist
Intel Security and BufferZone
To mitigate risk, IT organizations need to rethink their current endpoint security strategies and move past reactive security technologies. Forrester’s five design principles of an effective endpoint security strategy helps security professionals place attack surface reduction and tool integration as central focus points within their own strategies. Register
Secure What Matters Most in a BYOD World
McAfee and Apperian
Leading enterprises understand the value of mobility, but are struggling to create secure mobile environments while delivering on the promise of higher productivity that mobile can provide. Register
Accelerating Incident Response and Breach
McAfee and Guidance Software's EnCase
In today’s post-breach world, organizations need technology aligned with new strategies to accelerate and automate incident response and breach investigation workflows to reduce mean time to resolution. Register
Virtualize More While Improving Your Risk Posture from Bare Metal to Endpoint
McAfee and HyTrust
Gain insights into the virtualization security landscape, and understand how McAfee, Intel, and HyTrust can help you scale your VMware infrastructure while staying compliant and secure. Register
Target and Eliminate Privileged Account Security Threats
McAfee and Lieberman Software
Learn how McAfee ePolicy Orchestrator and Lieberman Software provide a model in which sensitive logins are controlled and passwords automatically revoked immediately after delegated IT personnel complete their work. Register
Do you know how to Secure the Other Half of Your Network?
McAfee and AirPatrol Corp
Learn how McAfee and AirPatrol Corporation can secure the other half of your network, the mobile devices, through detection, monitoring and endpoint security. Register
Protecting Against IP Theft –- Fighting an Effective Battle
McAfee and Securonix
Learn how using data loss prevention technologies and a powerful layer of in-context intelligence provide real-time detection of theft by leveraging behavioral profiling and accurate comparative algorithms. Register
Privileged Identity Management: Combine McAfee Security with Privileged User Access Control and Activity Monitoring
McAfee and Cyber-Ark
Learn how McAfee and Cyber-Ark work together to manage and continuously monitor privileged account usage across IT environments. Register
Understand the Business Impact of Endpoint Risk
McAfee and WCK
Learn how McAfee and WCK can help you gain business visibility into your risk and compliance and prioritize remediation efforts based on business criticality. Register