Information Security Solution Videos

Below you will find video content on many of our industry leading information security solutions. We invite you to explore one or many and we look forward to your feedback and questions!

Click here for Fortinet Videos

Topics Include:

  • Unified Threat Management
  • A Day in the Life of a FortiGate Admin
  • Threat Analysis and Reporting
  • Fortinet Wireless LANs
  • FortiMail Messaging Security Appliance
  • Application Security


Click here for Qualys Videos

Topics Include:

  • Automate PCI Compliance
  • Automate the Vulnerability Management Life Cycle
  • Automate IT Audit and eGRC Processes
  • Implementing Risk-Based Web Application Security


Click here for Sophos Videos

Topics Include:

  • Sophos UTM 9
  • Sophos Email Encryption Solution Demo
  • Sophos Web Security Solution Demo



Click here for LogRhythm Videos

Topics Include:

  • Making Log Data Useful
  • LogRhythm: SIEM 2.0
  • SIEM 2.0 – Filling the Visibility Gap
  • Personal Dashboard
  • LogRhythm Platform
  • Metadata
  • Alarms & Prioritization
  • Rapid Drill Down
  • One Click Correlation
  • Search and Investigations
  • Leveraging NetFlow Data
  • LogRhythm Tail
  • Comprehensive Reporting
  • Second Look/Audit Assurance
  • Log Distribution Services
  • Automatic Remediation
  • File Integrity Monitoring
  • Advanced Intelligent (AI) Engine(tm)
  • Demonstration
  • Overview
  • LogRhythm SIEM 2.0 – The Security Intelligence Platform for Cyberthreat Defense, Detection, and Response
  • LogRhythm, Protective Monitoring: GPG 13 Compliance
  • SmartRemediation
  • FIM & Host Activity Monitoring
  • About LogRhythm SIEM 2.0


Click here for Tripwire Videos

Topics Include:

  • Achieve and Maintain PCI Compliance
  • Achieve and Maintain SOX Compliance
  • Proactively Secure Your IT Infrastructure
  • Configuring and Securing Your Virtual Environment
  • Achieve and Maintain Control of Your IT Infrastructure



Click here for Firemon Videos

Topics Include:

  • FireMon® Firewall Management


Core Security

Click here for Core Security Videos

Topics Include:

  • Overview: CORE Impact Pro
  • Demo: CORE Impact Pro

Click here for Vasco Videos

Topics Include:

  • Vasco IDENTIKEY – Secure Remote Access