WEBINARS & PODCASTS
June 23, 2016 - How to Mitigate Lateral Movement of Malicious Activity
Despite record setting spending in the security space, data breach numbers are exploding. Today's cyber security landscape demands that we look beyond breach prevention, focusing more of our efforts on early detection, mitigating access, and quick response times.
June 3, 2016- Catbird CTO on Why New Security Models are Essential for Highly Virtualized Data Centers - Podcast
Dana Gardner, Software Productivity Analyst and Social Media Producer interviews CTO Holland Barry. Are yesterday’s perimeter-based security infrastructure methods up to the task? Or are new approaches needed to gain policy-based control over all virtual assets at all times?
June 17, 2015 - Cloud Security for HPE Helion from Catbird - Podcast
Bobby Patrick, CMO HPE Helion speaks with Bart Vansevenant, CMO Catbird about the recently announced partnership for cloud security from Catbird in HPE Helion technology.
February 19, 2015 - The Path to Micro-Segmentation
Whether you're responsible for implementing micro-segmentation, involved with data center or cloud transformation or just trying to understand the network connectivity requirements of your workloads ~ this is a must-see webinar.
January 12, 2015 - Who’s On Your Network? Understanding Cloud Security
Data Center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.
November 12, 2014 - PCI DSS 3.0 & Virtualization: Security Best Practices
It is vital for organizations using virtual technology in the CDE to adopt tools that protect cardholder data. In this webinar we will cover virtualization security best practices to achieve and maintain PCI DSS v3.0 compliance as well as outlining four specific requirements—not previously required with PCI DSS v2.0—that impact the CDE.
July 24, 2014 - Continuous Monitoring: Assuring Security & FISMA/FedRAMP Compliance
As cyber attacks increase, risk management strategies and best practices continue to evolve. There are unique challenges in securing cloud environments and it's critical to stay abreast of current methodologies.
April 16, 2014 - Beyond Compliance: Security Fundamentals for the Software-Defined Datacenter
Discover why: Compliance and security policies must be codified and automated in order to scale | Network and data flow diagrams (with accurate inventory and visibility to all connections between in-scope assets) are essential | Network activity must be monitored and enforced continuously with real-time notifications.
January 28, 2014 - Compliance & Security in the SDDC & the Secure Hybrid Cloud
Regulatory compliance can be achieved with the lowest levels of security in place. Defense-in-depth security begins with architecture and in the software-defined data center it requires a new level of administrative control. Security policies must be codified, automated, continuously monitored, validated, and enforced. And security must scale. Virtualization brings continuous change to the data center. Is your security keeping up?
November 6, 2013 - Navigating PCI Security Mountains in the Cloud
Organizations outsourcing card data to the cloud face significant security risks. Storing, processing and transmitting cardholder data in the cloud brings the cloud environment into scope for the PCI Data Security Standard (PCI DSS). And as soon as an organization adds other players to the offsite card-management mix, ensuring compliance with the PCI DSS becomes increasingly challenging. Listen to this panel discussion with Randal Asay of Catbird, Bob Russo of PCI SSC, and other industry experts to learn how to navigate these challenges.
August 5, 2013 - PCI Compliance at the Click of a Button
How do you demonstrate PCI compliance? Malcolm Rieke, Catbird Director of Product Development, provides an overview of PCI requirements and an in-depth look at how the vSecurity solution not only delivers the security required to meet or exceed PCI standards, but also automated monitoring and enforcement as well as audit-ready reports to prove compliance.