about us


An informal and informative discussion on Cloud and Mobile Strategies on Oct 6th

IBM and intiGrow are pleased to invite you to join Bob Kalka, Director of IBM Security Systems, for an informal and informative discussion on Cloud and Mobile Strategies

Cloud and Mobile security in the BYOD era has become a hot topic. Mobile technology has introduced significant risks, and the threats reach far beyond lost and stolen devices.

Bob will share his knowledge, customer experiences, and a strategy for addressing the Cloud and Mobile security challenges that organizations face today.

Webinar Information:

Date: October 6, 2014
Times: 10:00am to 11:00am (EST) or 2:00pm to 3:00pm (EST)
Click here to register


Advanced Threat Protection Webinar on Sep 30th

Join us for an integrated session towards Advanced Threat Protection by most experienced security specialists at IBM & intiGrow.

A single platform that provides a holistic view of integrated IBM Security Solutions with live solution demo to resolve your major Infrastructure Security concerns.

Webinar Information:

Host: Krish Bhatnagar & Rainer Barthel - intiGrow
Speaker: Stephen Keim & Mark Powell - IBM
Date: September 23 11:00 a.m. EST

Click here to register


Mobile Security Webinar Series

Many organizations see great potential from enabling mobile, but need more confidence they can support the business needs, including security.  This series will help you put together the foundation of a strategy for mobile device management and security integration.

Koolspan: Encrypted Voice & Text and Beyond

Airwatch: Enterprise Mobile Management

SecurIT: Flexible Authentication for Mobile Security and Beyond

IBM Q1: Protecting Mobile Communications with Security Intelligence


intiGrow Partner Hitachi ID Systems Hosts Webinar

Calgary, Alberta, August 16, 2013 -  Hitachi ID, a developer of automated user identity and governance software, is hosting a webinar on Tuesday, August 27, 2013.  The webinar is scheduled for 1:00 PM eastern/10:00 AM Pacific, and is entitled "The Role of Relationships in Identity and Access Management."


A collaborative look into Privileged Access Management

Your organization must properly govern access to all it's resources. Privileged identities hold elevated permission to access files, install and run programs, and change server configuration settings. These keys to your IT kingdom exist on virtually every server and desktop operating system, business application, database, Web service, and network appliance in your organization. Can you readily prove who has access to these critical resources, and what they can do?


Page 1 of 4

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  Next 
  •  End 
  • »