RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

Size: px
Start display at page:

Download "RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education"

Transcription

1 RSA Archer Training Governance, Risk and Compliance Managing enterprise-wide governance, risk and compliance through training and education 1

2 RSA Archer Training Table of Contents RSA Archer Administration... 1 RSA Archer Advanced Administration... 3 Getting Started with Enterprise Risk Management... 5 Getting Started with Policy and Compliance Management... 7 RSA Security Operations Management Solution Basics... 9 RSA Vulnerability Risk Management Basics RSA Archer Custom End-User Training Service... 13

3 RSA Archer Administration Course Description AT-A-GLANCE This course provides an overview to the concepts, processes, and procedures necessary to successfully design and administer the RSA Archer platform. Overview Students will gain knowledge of the key RSA Archer platform components such as applications, security management, and communication tools through presentations and hands-on exercises. After taking this course, students will be able to plan, configure, and manage the RSA Archer environment. The subject matter in this course prepares students with the classroom component recommended for the RSA Archer Certified Administrator certification. Audience Archer administrators who are responsible for building and managing the RSA Archer egrc product. Duration 4 days REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED ARCADMIN210 Onsite class Prerequisite Knowledge/Skills A general understanding of business processes and computer-based business applications. Course Objectives Upon successful completion of this course, participants should be able to: Describe the components of the RSA Archer Enterprise Management Solution Navigate within the RSA Archer system Configure the look and feel of the RSA Archer Platform interface Centralize and organize data Import data Alert users to data changes Optimize the user experience Manage user access Automate work streams Complete a questionnaire Describe integration options Search and report on data Communicate information to key stakeholders Migrate changes between environments ED ARC TRAIN UNIT Training Units 1 Page 1

4 Course Outline Introduction to RSA Archer RSA Archer egrc Suite Solution components Introduction to the case study General Navigation Interface components Managing content records Configure the Appearance Managing Themes Managing the Appearance Centralize and Organize Data Data structure Application Builder overview Inside Manage Applications General Application Properties Field Management Page Layout Navigation Menu Import Data Using the Data Import Manager Alert Users to Data Changes Creating Letterheads Managing Subscription Notifications Troubleshooting Tips Optimize the User Experience Data-Driven Events Calculated Fields Troubleshooting Tips Manage User Access Access Control Basics User Accounts Access Roles Groups Record Permissions Private Fields Troubleshooting Tips Automate Work Streams Configure a two-stage workflow Task Management Enabling Task Management Questionnaires Question Library Overview Questionnaire Creation Process Completing a Questionnaire Integration Options Data Feed Manager API Resources Search and Report on Data Quick Search Advanced Search Statistics Search and Chart Options Reporting Communicate Information to Stakeholders iviews Dashboards Workspaces Additional Configuration Options Packaging for Production Creating Packages Installing Packages Advanced Package Mapper Design Best Practices Field Design Tips Application Layout Tips Data-Driven Event Tips Vendor Management Case Study Hands-on exercise in which participants are challenged to build a best-in-class vendor data application with minimal assistance Course Summary Customer Support Options Certification Exam Information Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 2

5 RSA Archer Advanced Administration Course Description AT-A-GLANCE This course provides handson training on the administration, configuration and bestpractice deployment of the RSA Archer Platform. Overview Throughout the course, students will be presented with a diverse collection of realworld governance, risk, and compliance problems and be shown and guided through the recommended steps involved in solving these pain points by using the features available in the RSA Archer egrc Suite. Extensive hands-on labs reinforce the tasks involved in designing and automating GRC processes and extending the value of the RSA Archer egrc Suite throughout the organization. After completing this class, students will be prepared to use the RSA Archer egrc Suite to solve an extensive array of GRC problems and meet the business requirements of various enterprise stakeholders. Audience Governance, risk, and/or compliance professionals, business owners, or IT personnel who need to automate and streamline existing processes, integrate the RSA Archer platform with third-party systems, or deliver assessments across the enterprise. REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED ARCADVADM210 Onsite class ED ARC TRAIN UNIT Training Units Duration 4 days Prerequisite Knowledge/Skills Previous experience creating applications within the RSA Archer product or successful participation in the standard RSA Archer Administration course. Course Objectives Upon successful completion of this course, participants should be able to: Create a custom, multi-stage workflow process that automates a manual process Import existing information from a legacy system into RSA Archer applications and questionnaires Integrate the RSA Archer product with third-party systems and data sources to consolidate enterprise information Design best-practice assessment campaigns to measure compliance across the organization Construct complex search criteria to locate key information and identify data trends Visually showcase compliance with industry regulations through reports and dashboards Alert organization stakeholders through scheduled report distributions Export RSA Archer data into pre-formatted, professional-looking report templates 3 Page 3

6 Course Outline Streamlining GRC Processes Day One Replicating a multi-stage workflow to transfer a manual, paper-based process to an automated, online tool Constructing a scalable access control framework for enabling end users to participate in GRC processes Automating and manipulating data through calculations to support enhanced data analytics and reduce data entry time Integrating External Data Day Two Transferring leveled, document-centric policies into a data-centric format in the RSA Archer Platform Using a data feed targeting database sources to quickly transfer legacy data to a centralized system Creating a data feed to access an RSS source and retrieve the information into an RSA Archer application Transferring data between RSA Archer applications to support data trending and reduce manual effort Demonstrating Compliance Day Three Importing compliance questions into RSA Archer s global question library Creating an assessment campaign to demonstrate compliance with internal and external regulations Managing question scoring and findings generation to better understand the risk impact to the organization Referencing existing assessment responses in future assessments Communicating GRC Data Day Four, Part I Generating real-time reports across distant data relationships to provide greater insights into GRC processes Designing a user-friendly dashboard and interface to clearly communicate the posture of various business units Delivering snapshot reports on a set schedule to inform key stakeholders of the current status Exporting RSA Archer data to and Word templates to generate professional-looking, document-based reports for senior management Publishing RSA Archer data to external databases Maintaining the System Day Four, Part II Discussing resources for the most current installation and sizing recommendations Configuring instance settings via the Archer Control Panel Accessing and reading log files Troubleshooting common RSA Archer issues to ensure effective system operations Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 4

7 Getting Started with Enterprise Risk Management Course Description AT-A-GLANCE This course provides an overview of the concepts, processes, and procedures necessary to successfully begin implementation of an Enterprise Risk Management (ERM) system. Overview Students will gain knowledge of the key RSA Archer ERM components through presentations and hands-on exercises. Audience Risk management team members who will be using the RSA Archer Risk Management solution to define, support, and maintain a risk management initiative. This may include managers, team leads, and anyone involved in scoping a risk project. Duration 2 days REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Prerequisite Knowledge/Skills Familiarity with RSA Archer egrc framework and a general familiarity with organizational Risk concepts. Course Objectives Upon successful completion of this course, participants should be able to: Explain basic Risk Management terminology and methodologies Illustrate the structure of the RSA Archer Risk Management Solution Define business requirements related to Risk Management Begin the implementation process of an Enterprise Risk Management program Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED ARCERM210 Onsite class ED ARCTRAIN UNIT Training Units 5 Page 5

8 Course Outline Introduction to Risk Management What is Risk? General Enterprise Risk Management Approach Overview Types of Risk Digging Deeper Common Frameworks Overview Developing a Common Risk Taxonomy Elements of Risk Management Phases of Growth: Risk Identification Assessment Decision Treatment Monitoring RSA Archer Risk Management Solution RSA Archer ERM Structure Components ERM Processes and Key Integrations with Other Solutions How RSA Archer Maps to Common Risk Frameworks Top-Down Risk Assessment Discussion: Common Issues for Specific Industries/Business Types Exercise: Risk Identification Exercise: Risk Assessment Exercise: Risk Decision Exercise: Risk Treatment Exercise: Metrics Monitoring Exercise: Loss Monitoring Exercise: Overall Monitoring Bottom-Up Risk Assessment Exercise: Create a new Risk Project Exercise: Complete Risk Assessments Exercise: Create reports based on new data Exercise: Bring in sample model data via Data Import Exercise: Create dashboard that incorporates model data s impact on business Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 6

9 Getting Started with Policy and Compliance Management Course Description AT-A-GLANCE This course provides an overview of the concepts, processes, and procedures necessary to successfully begin implementation of a Policy and Compliance Management system. Overview Students will gain knowledge of the key RSA Archer Policy and Compliance Management components through presentations and hands-on exercises. Audience Policy and Compliance management team members who will be using the RSA Archer Policy and Compliance Management solution to define, implement, and maintain a policy and compliance management initiative. This may include managers, team leads, and anyone involved in consolidating policies and ensuring compliance with authoritative sources. Duration 2 days REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED ARCPCM210 Onsite class ED ARC TRAIN UNIT Training Units Prerequisite Knowledge/Skills Familiarity with the RSA Archer egrc framework and a general familiarity with policy and compliance concepts. Course Objectives Upon successful completion of this course, participants should be able to: Explain basic Policy and Compliance Management issues and processes Illustrate the structure of the RSA Archer Policy and Compliance Management Solution Begin the implementation process of a Policy and Compliance Management program 7 Page 7

10 Course Outline Introduction to Policy and Compliance Management Top Policy and Compliance Management Issues Policy and Compliance Processes in a Nutshell Policy and Compliance Key Components RSA Archer Policy Management Solution RSA Archer Interface RSA Archer Policy Structure Components Phased Implementation Approach Post-Implementation Processes Policy Management Exercises Exercise: Analyze Existing Policy Exercise: Define Scope Extraction & Mapping Exercise: Policy Extraction Exercise: Control Standard Extraction & Mapping Exercise: Format/Import Content Exercise: Perform a Gap Analysis Exercise: Import Provided Content Exercise: Approve a Policy Change Exercise: Policy Awareness Campaign RSA Archer Compliance Management Solution Sarbanes-Oxley Act Concerns RSA Archer Compliance Structure Components How Compliance is Rated Exception Requests Workflow Compliance Management Exercises Exercise: Review Control Procedure Mapping Exercise: Assess a Process Control Exercise: Assess a Technical Control Exercise: Address Findings Remediation Plan Exercise: Address Findings Exception Request Compliance Strategies Control-Based Compliance Asset-Based Compliance Compliance Testing Cycle Round Table Discussion Additional Resources Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 8

11 RSA Security Operations Management Solution Basics Course Description AT-A-GLANCE This course provides an overview of the concepts, processes, and procedures to effectively use RSA Security Operations Management Solution in a Security Operations Center. Overview Students will gain knowledge of the structure and operations of the RSA Security Operations Management Solution through presentations and hands-on exercises. This course addresses the tasks and responsibilities of several typical roles and personas that are part of an organization s Security Operations Center. Audience Customers who perform the following jobs can benefit from this course: Security Operations Center (SOC) manager Breach coordinator Incident coordinator Incident handler IT Helpdesk analyst REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED SECOPS210 Onsite class ED ARCTRAIN UNIT Training Units Duration 2 days Prerequisite Knowledge/Skills To receive the most benefit from this training, we recommend that students have: Basic understanding of the use and management of RSA Archer and RSA Archer Enterprise Management Solution Basic understanding of the use and management of RSA Security Analytics Familiarity with basic security event reporting and analysis Familiarity with basic Security Operations Center functions and tasks Course Objectives Upon successful completion of this course, participants should be able to: Understand the industry standards such as VERIS, NIST, and SANS with respect to reporting and managing a security incident response process; and how RSA Security Operations Management Solution is so aligned Understand the high-level solution architecture of the RSA Security Operations Management Solution Explain the security operations management workflow supported by the RSA Security Operations Management Solution Explain and navigate the built-in dashboards of the RSA Security Operations Management Solution Identify and understand the differences between the six personas (roles) supported by the RSA Security Operations Management Solution Understand the workflows in the solution for the respective SOC personas Identify the phases and workflow relating to incident management Understand the contribution of RSA Security Operations Management Solution to SOC operations 9 Page 9

12 Course Outline Security Operations Management Overview Function and purpose of a Security Operations Center (SOC) Security incident response industry standards [VERIS, NIST, and SANS] Capabilities of RSA Security Operations Management Solution Solution architecture Key personas in Security Operations Management Security Operations workflow RSA Archer Enterprise Management Solution Overview Introduction to RSA Security Operations Management Solution RSA Security Operations Management Solution dashboards and navigation RSA Security Operations Management Solution implementation lifecycle Managing SOC Readiness Managing the SOC staff and Contacts Managing SOC policies and procedures Incident Response Incident response workflow Alerts and incidents; aggregating alerts Incident types Incident Declaration, Creation, Assignment, Review, and Closure Incident response tasks Incident escalation Incident investigation, forensic and impact analysis Handling shift handovers Data Breach Response Data Breach response workflow Breach risk assessment Declaring a breach Creating and assigning breach tasks Executing a call tree Remediation Issue remediation workflow Findings process Resolving and reviewing findings Exception process Remediation plan Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 10

13 RSA Vulnerability Risk Management Basics Course Description AT-A-GLANCE This course provides an overview of the concepts, processes, and procedures to effectively use RSA Security Operations Management Solution in a Security Operations Center. Overview Students will gain knowledge of the structure and operations of the RSA Archer Vulnerability Risk Management Solution through presentations, demonstrations and hands-on exercises. This course addresses the tasks involved in receiving vulnerability data as Threat Intelligence from sources such as the National Vulnerability Database (NVM) and device asset data from vulnerability scanners such as Nessus and McAfee. Students practice matching vulnerability data with business context from RSA Archer Enterprise Management Solution and creating remediation and exception plans and processes. REGISTER FOR CLASSES: For an up-to-date schedule of Instructor-led classes and other training options, visit the RSA Training and Certification web site: CONTACT US: Phone: Int l: Fax: Middlesex Turnpike Bedford, Massachusetts COURSE PART NUMBERS: ED VRM210 Onsite class ED ARC TRAIN UNIT Training Units Audience Customers who perform the following jobs can benefit from this course: Security Operations Center (SOC) manager Security Analyst Incident handler / Incident responder IT Helpdesk analyst Duration 2 days Prerequisite Knowledge/Skills To receive the most benefit from this training, we recommend that students have: Basic understanding of the use and management of RSA Archer and RSA Archer Enterprise Management Solution Familiarity with basic security event reporting and analysis Familiarity with basic Security Operations Center functions and tasks Course Objectives Upon successful completion of this course, participants should be able to: Understand how RSA Vulnerability Risk Management can be used to define and analyze assets, vulnerabilities and remediate risks Understand the high-level solution architecture of the RSA Vulnerability Risk Management Solution Explain the workflow supported by the RSA Vulnerability Risk Management Solution Navigate and interpret the RSA Vulnerability Analytics interface Identify the phases and workflow relating to remediation and exception processes 11 Page 11

14 Course Outline Vulnerability Risk Management Overview Challenges of vulnerability risk management Business needs for vulnerability risk management Introduction to RSA Vulnerability Risk Management Solution RSA Vulnerability Analytics and RSA vulnerability Risk Management Solution architecture RSA Vulnerability Risk Management Workflow Comparison of RSA Vulnerability Risk Management vs. RSA Archer Threat Management Solution RSA Vulnerability Risk Management Solution Implementation Lifecycle Deploying RSA Vulnerability Risk Management Identifying Data Sources Deploying RSA VRM Components Defining and Implementing Your Business Rules and Processes RSA Vulnerability Analytics Components of RSA Vulnerability Analytics Working with the Vulnerability Analytics dashboard Exploring data in reports Drilling into data with Search Automating data handling with Rules Remediating groups of issues as Tickets RSA Archer Vulnerability Risk Management Solution RSA Monitoring remediation and scan activity with RSA Vulnerability Risk Management Solution dashboards RSA Vulnerability Risk Management Solution Sub-solutions and Applications Vulnerability trending analysis Issue management Device synchronization between RSA Vulnerability Analytics and RSA Vulnerability Risk Management Solution Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 12

15 RSA Archer Custom End-User Training Data Sheet Overview RSA Archer supports business-level management of enterprise governance, risk and compliance. With RSA Archer you have the ability to adapt a solution to your requirements without touching a single line of code. The most demanding Fortune 500 companies have seized the power of RSA Archer to automate business process, streamline workflow, control user access, and tailor a user interface and report in real time. AT-A-GLANCE Select the training option that best fits your requirements: Live, Virtual TTT: One half-day of instructor-led, Train-the- Trainer delivered virtually to your training team. Includes 10 days of custom development. ED ARC EUTTT 210 E-Learning: Self-paced, SCORMcompliant e-learning module (with audio) that provides unlimited distribution through your own training site. Includes 15 days of custom development. ED ARC EUELN 210 To ensure that your RSA Archer solution is being leveraged to its maximum potential, RSA Education Services offers the RSA Archer Custom End-User Training Service to guide you through the process of training your organization s end user population. Offering Details With practical experience using Archer solutions, business process and risk management expertise, and instructional design and training delivery skills, an RSA Training Consultant will work closely with you to understand your specific RSA Archer use case and identify learning objectives. You ll have the opportunity to review the training content along the way to ensure that you receive deliverables that will successfully meet your training objectives. While every customer s use case is unique, training may include topics like the following: RSA Archer Overview General Navigation Working with records Instructor-Led: Three days of instructor-led training delivered onsite at your location. Includes 10 days of custom development. ED ARC EUILT 210 Searching and Reporting Custom topics (defined with the customer) This education service is based on a single use case and includes the following: A needs assessment to understand the customer s use case and training requirements CONTACT US Phone: Int l: Fax: Middlesex Turnpike A scripted PowerPoint slide deck that includes content customized to your environment Content branded with the organization s logo and standard.ppt template Unlimited use of materials for its end users Access to an editable version of the content Bedford, Massachusetts It was an absolutely fantastic course due to the instructor s energy, enthusiasm, and excitement about the product and interest in our success. The coaching and support throughout the process had a huge impact on our team. VP Educational Services Large Financial Institution 13 Page 13

16 ABOUT RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading egrc capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit and or RSA Global Services Sales. Copyright 2015 EMC Corporation. All rights reserved. 02/18/15 EMC 2, EMC, RSA, RSA Security, Archer and the RSA logo are registered trademarks of EMC Corporation in the United States and/or other countries Page 14

RSA CUSTOMER EDUCATION CATALOG

RSA CUSTOMER EDUCATION CATALOG RSA CUSTOMER EDUCATION CATALOG S e r v i c e s C a t a l o g Q 3 2015 COURSE DESCRIPTION INDEX Identity and Access Management Governance, Risk and Compliance Security Operations Anti Fraud Cyber Defense

More information

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief The RSA Solution for Cloud Security and Compliance A GRC foundation for VMware infrastructure security and compliance Solution Brief The RSA Solution for Cloud Security and Compliance enables end-user

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA

More information

RSA CUSTOMER EDUCATION CATALOG

RSA CUSTOMER EDUCATION CATALOG RSA CUSTOMER EDUCATION CATALOG S e r v i c e s C a t a l o g Q 4 2015 COURSE DESCRIPTION INDEX Identity and Access Management RSA Access Manager Administration, Installation and Configuration... 9 RSA

More information

RSA Archer Certified Administrator (CA) Certification Examination Study Guide

RSA Archer Certified Administrator (CA) Certification Examination Study Guide RSA Archer Certified Administrator (CA) Certification Examination Study Guide Introduction The RSA Archer Certified Administrator (CA) examination is based on the critical job functions that an individual

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Simply Sophisticated. Information Security and Compliance

Simply Sophisticated. Information Security and Compliance Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

IT Security Risk Management

IT Security Risk Management IT Security Risk Adding Insight to Security Gennaro Scalo April 2, 2014 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity Data Breaches Damage

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief RSA SECURITY MANAGEMENT An Integrated approach to risk, operations and incident management Solution Brief THE PROBLEM WITH TACTICAL SECURITY MANAGEMENT What are your organization s most pressing IT security

More information

Designing and Developing Microsoft SharePoint Server 2010 Applications Course Outline

Designing and Developing Microsoft SharePoint Server 2010 Applications Course Outline Designing and Developing Microsoft SharePoint Server 2010 Applications Course Outline Course Overview: This five-day instructor-led course is intended for SharePoint Development professionals who are responsible

More information

EMPCENTER COURSE CATALOG

EMPCENTER COURSE CATALOG EMPCENTER COURSE CATALOG WorkForce Academy and WorkForce Academy On Demand The key to using any software is proper training. First-class training, coupled with a commitment to the implementation, makes

More information

Designing and Developing Microsoft SharePoint Server 2010 Applications (MS10232)

Designing and Developing Microsoft SharePoint Server 2010 Applications (MS10232) Duration: 5 days Description This training is intended for SharePoint Development professionals who are responsible for leading projects, designing solutions, and identifying problems. Students learn the

More information

Implementing and Administering an Enterprise SharePoint Environment

Implementing and Administering an Enterprise SharePoint Environment Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified

More information

No-Code SharePoint 2013 Workflows with SharePoint Designer 2013 and Visio 55048A; 3 Days, Instructor-led

No-Code SharePoint 2013 Workflows with SharePoint Designer 2013 and Visio 55048A; 3 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc No-Code SharePoint 2013 Workflows with SharePoint Designer 2013 and Visio

More information

Implementing Project Server 2010

Implementing Project Server 2010 Implementing Project Server 2010 Course ISI-1327 4 Days Instructor-led, Hands-on Course Description This instructor-led course will provide you with the knowledge and skills to effectively install and

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business

More information

Salesforce Certified Marketing Cloud Social Specialist Study Guide

Salesforce Certified Marketing Cloud Social Specialist Study Guide Salesforce Certified Marketing Cloud Social Specialist Study Guide Spring 16 STUDY GUIDE 0 Contents SECTION 1. PURPOSE OF THIS STUDY GUIDE... 2 SECTION 2. ABOUT THE SALESFORCE CERTIFIED MARKETING CLOUD

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Microsoft Project Server 2010 Technical Boot Camp

Microsoft Project Server 2010 Technical Boot Camp Microsoft Project Server 2010 Technical Boot Camp Course M50558 5 Day(s) 30:00 Hours Introduction Course retirement date: November 30, 2012 For a complete list of courseware retirements, see: www.microsoft.com/learning/en/us/training/retired

More information

This course will also teach how to create various kinds of dashboards using Reporting Services.

This course will also teach how to create various kinds of dashboards using Reporting Services. Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length : 3 Days (24 Hours) Language(s) : English Audience(s) : IT Professionals Level : 200 Technology : Microsoft SQL Server 2008

More information

NE-10750A Monitoring and Operating a Private Cloud with System Center 2012

NE-10750A Monitoring and Operating a Private Cloud with System Center 2012 NE-10750A and Operating a with System Center 2012 Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 16 June 2012 200 Microsoft System Center 2012 Delivery Method

More information

Se i o Pricing Document

Se i o Pricing Document Se i o Pricing Document This document details pricing structures and policies for ServiceNow. It includes information on the ServiceNow pricing model for standard packages as well as all options and add---ons.

More information

SharePoint 2010 for Project Management Course SP03; 3 Days, Instructor-led

SharePoint 2010 for Project Management Course SP03; 3 Days, Instructor-led SharePoint 2010 for Project Management Course SP03; 3 Days, Instructor-led Course Description Leverage Microsoft SharePoint to increase the success rate of your projects and meetings in this SharePoint

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

PCI DSS READINESS AND RESPONSE

PCI DSS READINESS AND RESPONSE PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and

More information

TRAINING & CERTIFICATION

TRAINING & CERTIFICATION Course Catalog The following provides a summary of our entire course catalog. This list changes with every new addition. Some titles may be under development. All titles and availability are subject to

More information

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE)

VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE) VCE Word Template Table of Contents www.vce.com VBLOCK GRC SOLUTION WITH RSA (GOVERNANCE, RISK, AND COMPLIANCE) August 2011 1 Contents Executive Summary... 3 The Challenge... 3 The Solution... 4 Governance,

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

White paper. Creating an Effective Security Operations Function

White paper. Creating an Effective Security Operations Function White paper Creating an Effective Security Operations Function Awareness of security issues is fundamental to an effective policy. When we think of a security operations center (SOC), we often have an

More information

MS-10232 - PRO: Designing Applications for Microsoft SharePoint 2010

MS-10232 - PRO: Designing Applications for Microsoft SharePoint 2010 MS-10232 - PRO: Designing Applications for Microsoft SharePoint 2010 Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

RSA EDUCATION SERVICES CATALOG

RSA EDUCATION SERVICES CATALOG RSA EDUCATION SERVICES CATALOG Services Catalog - April 2012 COURSE DESCRIPTION INDEX Access Management Authentication Enterprise Governance, Risk and Compliance Data Loss Prevention RSA Access Manager

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Microsoft Enterprise Project Management 2010 Licensing Guide

Microsoft Enterprise Project Management 2010 Licensing Guide Microsoft Enterprise Project Management 2010 Licensing Guide Microsoft Project 2010 Licensing Microsoft Project 2010 is a family of products that provide a range of functionality depending on organizational

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint

More information

Symantec ServiceDesk 7.1

Symantec ServiceDesk 7.1 Information Technology Infrastructure Library support and process automation puts the service back in service desk Data Sheet: Endpoint Management Overview IT departments are coming under pressure to do

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Symantec Control Compliance Suite. Overview

Symantec Control Compliance Suite. Overview Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

Fast Track: Applications in Microsoft Dynamics CRM 2015 / CRM Online (Microsoft Training Course: F1082) - 2 days

Fast Track: Applications in Microsoft Dynamics CRM 2015 / CRM Online (Microsoft Training Course: F1082) - 2 days Fast Track: Applications in Microsoft Dynamics CRM 2015 / CRM Online (Microsoft Training Course: F1082) - 2 days TARGET AUDIENCE This course provides both an introduction to Microsoft Dynamics CRM 2015

More information

Trusted Geolocation in The Cloud Technical Demonstration

Trusted Geolocation in The Cloud Technical Demonstration Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation Trusted Geolocation in the Cloud Business Business

More information

CA Service Desk On-Demand

CA Service Desk On-Demand PRODUCT BRIEF: CA SERVICE DESK ON DEMAND -Demand Demand is a versatile, ready-to-use IT support solution delivered On Demand to help you build a superior Request, Incident, Change and Problem solving system.

More information

Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Design of the Course

Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions Design of the Course Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions 1 Trainer Preparation Guide for Course 20488B: Developing Microsoft SharePoint Server 2013 Core Solutions

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

10965 - IT Service Management with System Center Service Manager

10965 - IT Service Management with System Center Service Manager 10965 - IT Service Management with System Center Service Manager Duration: 4 Days Course Price: $2,975 Course Description Course Overview This four day training course will provide students with the key

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

EMC Data Protection Advisor 6.0

EMC Data Protection Advisor 6.0 White Paper EMC Data Protection Advisor 6.0 Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection environments, improve compliance

More information

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief

RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief RSA ARCHER BUSINESS CONTINUITY MANAGEMENT AND OPERATIONS Solution Brief INTRODUCTION Now more than ever, organizations depend on services, business processes and technologies to generate revenue and meet

More information

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

BlackStratus for Managed Service Providers

BlackStratus for Managed Service Providers BLACKSTRATUS FOR MSP SOLUTION GUIDE PAGE TM BlackStratus for Managed Service Providers With BlackStratus MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

STREAM Cyber Security

STREAM Cyber Security STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software

More information

6236A - Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services

6236A - Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services 6236A - Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Course Number: 6236A Course Length: 3 Days Course Overview This instructor-led course teaches students how to implement

More information

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information

More information

nfx One for Managed Service Providers

nfx One for Managed Service Providers NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line

More information

Omniture University Course Catalog

Omniture University Course Catalog Omniture University Course Catalog Welcome to the Omniture University Course Catalog. This catalog gives basic information on the courses offered, as well as the courses that are recommended for you, based

More information

CRG Academy Course Descriptions. Corporate Renaissance Group 6 Antares Drive, Phase 1, Suite 200 Ottawa, ON K2E 8A9 www.crgroup.

CRG Academy Course Descriptions. Corporate Renaissance Group 6 Antares Drive, Phase 1, Suite 200 Ottawa, ON K2E 8A9 www.crgroup. CRG Academy s Corporate Renaissance Group 6 Antares Drive, Phase 1, Suite 200 Ottawa, ON K2E 8A9 www.crgroup.com Updated February 2013 CRG Academy Courses Microsoft Dynamics GP... 3 Foundational Overview

More information

Choosing the Right Project and Portfolio Management Solution

Choosing the Right Project and Portfolio Management Solution Choosing the Right Project and Portfolio Management Solution Executive Summary In too many organizations today, innovation isn t happening fast enough. Within these businesses, skills are siloed and resources

More information

Microsoft SharePoint 2010 Site Collection and Site Administration Course 50547A; 5 Days, Instructor-led

Microsoft SharePoint 2010 Site Collection and Site Administration Course 50547A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Microsoft SharePoint 2010 Site Collection and Site Administration Course

More information

Achieve Your Business and IT Goals with Help from CA Services

Achieve Your Business and IT Goals with Help from CA Services Achieve Your Business and IT Goals with Help from CA Services How Does CA Services Approach an Engagement? Whether its planning, implementing or running our industry leading software, CA Services can help

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Customer Success Platform Buyer s Guide

Customer Success Platform Buyer s Guide Customer Success Platform Buyer s Guide Table of Contents Customer Success Platform Overview 3 Getting Started 4 Making the case 4 Priorities and problems 5 Key Components of a Successful Customer Success

More information

Assessing campaign management technology

Assessing campaign management technology Assessing campaign management technology Introduction Table of contents 1: Introduction 2: 1. Can the campaign management platform be used to build a single marketing view of customers? 3: 2: Can the campaign

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Tivoli Security Information and Event Manager V1.0

Tivoli Security Information and Event Manager V1.0 Tivoli Security Information and Event Manager V1.0 Summary Security information and event management (SIEM) is a primary concern of the CIOs and CISOs in many enterprises. They need to centralize security-relevant

More information

Salesforce Certified Marketing Cloud Social Specialist Study Guide

Salesforce Certified Marketing Cloud Social Specialist Study Guide Salesforce Certified Marketing Cloud Social Specialist Study Guide Summer 15 BETA STUDY GUIDE 0 Contents SECTION 1. PURPOSE OF THIS STUDY GUIDE... 2 SECTION 2. ABOUT THE SALESFORCE CERTIFIED MARKETING

More information

Conquering the Continuous Monitoring Challenge

Conquering the Continuous Monitoring Challenge Conquering the Continuous Monitoring Challenge Govplace 1886 Metro Center Drive Suite 100 Reston, VA 20190 703.466.5166 In many organizations, the advent of Continuous Monitoring requirements has severely

More information

BMC Remedy IT Service Management Suite

BMC Remedy IT Service Management Suite BMC Remedy IT Service Management Suite BMC Remedy ITSM enables streamlined service delivery with an amazing user experience on both sides of the service desk. Business Challenge Today s enterprises are

More information

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

MS-10750: Monitoring and Operating a Private Cloud with System Center 2012. Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery MS-10750: Monitoring and Operating a Private Cloud with System Center 2012 This course describes the various components of System Center and how to deploy, monitor and manage a service and prepackaged

More information

Boosting enterprise security with integrated log management

Boosting enterprise security with integrated log management IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise

More information

ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS

ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS ACCELUS RISK MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

ACCELRYS DISCOVERANT

ACCELRYS DISCOVERANT CATALOG ACCELRYS DISCOVERANT 2013 COURSE CATALOG We are proud to offer a variety of courses to meet your organization s needs. These classes are designed to teach everything from the basics of navigation

More information

www.siemens.com/learningcloud Training Catalog

www.siemens.com/learningcloud Training Catalog www.siemens.com/learningcloud Training Catalog Siemens Power Academy Energy Management Software 1 Table of Contents Product Training Focus EnergyIP Platform Smart Grid Applications Data Analytics Adapters

More information

Flexible Training Options to Make the Most of Your IPAM Deployment

Flexible Training Options to Make the Most of Your IPAM Deployment Training Services Flexible Training Options to Make the Most of Your IPAM Deployment BlueCat offers a full curriculum of technical training to provide your staff with the knowledge and skills they need

More information

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able

More information

RSA EDUCATION SERVICES CATALOG

RSA EDUCATION SERVICES CATALOG RSA EDUCATION SERVICES CATALOG Services Catalog Q 2 2014 COURSE DESCRIPTION INDEX Identity and Access Management Authentication Governance, Risk and Compliance Data Loss Prevention Network Monitoring and

More information

How to Secure Your SharePoint Deployment

How to Secure Your SharePoint Deployment WHITE PAPER How to Secure Your SharePoint Deployment Some of the sites in your enterprise probably contain content that should not be available to all users [some] information should be accessible only

More information

The Power of the Unica Marketing Platform

The Power of the Unica Marketing Platform White Paper The Power of the Unica Marketing Platform The Unica Marketing Platform is a set of administration tools, user interface elements and integration services shared by all Unica products. First

More information

EMC ACADEMIC ALLIANCE

EMC ACADEMIC ALLIANCE EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. EMC ACADEMIC ALLIANCE EMC collaborates with colleges and universities worldwide

More information

ALM120 Application Lifecycle Management 11.5 Essentials

ALM120 Application Lifecycle Management 11.5 Essentials ALM120 Application Lifecycle Management 11.5 Essentials Instructor-Led Workshop OVERVIEW This course provides the tools you need to implement and use Quality Center 11.50. Students learn how to manage

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Essentials of Training. Your resource for Education Services

Essentials of Training. Your resource for Education Services Essentials of Training Your resource for Education Services Introduction As the educational arm of Enterprise Software, our mission is to empower Customers through premier, customer-centric educational

More information