Catbird Solution Overview
Catbird Technical Overview
June 17, 2015
Bobby Patrick, CMO HP Helion speaks with Bart Vansevenant, CMO Catbird about the recently announced partnership for cloud security from Catbird in HP Helion technology.
The Path to Micro-Segmentation
February 19, 2015
Whether you're responsible for implementing micro-segmentation, involved with data center or cloud transformation or just trying to understand the network connectivity requirements of your workloads ~ this is a must-see webinar.
Who’s On Your Network? Understanding Cloud Security
January 12, 2015
Data Center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.
PCI DSS 3.0 & Virtualization: Security Best Practices
November 12, 2014
It is vital for organizations using virtual technology in the CDE to adopt tools that protect cardholder data. In this webinar we will cover virtualization security best practices to achieve and maintain PCI DSS v3.0 compliance as well as outlining four specific requirements—not previously required with PCI DSS v2.0—that impact the CDE.
Continuous Monitoring: Assuring Security & FISMA/FedRAMP Compliance
July 24, 2014
As cyber attacks increase, risk management strategies and best practices continue to evolve. There are unique challenges in securing cloud environments and it's critical to stay abreast of current methodologies.
Beyond Compliance: Security Fundamentals for the Software-Defined Datacenter
April 16, 2014
Discover why: Compliance and security policies must be codified and automated in order to scale | Network and data flow diagrams (with accurate inventory and visibility to all connections between in-scope assets) are essential | Network activity must be monitored and enforced continuously with real-time notifications
Compliance & Security in the SDDC & the Secure Hybrid Cloud
January 28, 2014
Regulatory compliance can be achieved with the lowest levels of security in place. Defense-in-depth security begins with architecture and in the software-defined data center it requires a new level of administrative control. Security policies must be codified, automated, continuously monitored, validated, and enforced. And security must scale. Virtualization brings continuous change to the data center. Is your security keeping up?
Navigating PCI Security Mountains in the Cloud
November 6, 2013
Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging. Listen to this panel discussion with Randal Asay of Catbird, Bob Russo of PCI SSC, and other industry experts to learn how to navigate these challenges.
PCI Compliance at the Click of a Button
August 5, 2013
How do you demonstrate PCI compliance? Malcolm Rieke, Catbird Director of Product Development, provides an overview of PCI requirements and an in depth look at how the vSecurity solution not only delivers the security required to meet or exceed PCI standards, but also automated monitoring and enforcement as well as audit-ready reports to prove compliance.