VIRTUAL ENVIRONMENT:
This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
VIDEO:
This training course was designed for professional developers interested in using Microsoft SharePoint 2010 to rapidly develop and deploy solutions. The course contains a series of videos and presentations that will help guide you along the way.
WEBCAST:
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.
VIDEO:
Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost. Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
WEBCAST:
This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
WEBCAST:
This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
WEBCAST:
This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
WEBCAST:
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.