ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • GDPR & Data Protection Webcast

    Sponsored by: Oracle

    Take an in-depth look at this data protection and GDPR webcast to learn more about the regulation and uncover relevant compliance strategies. In addition, hear from a business consultant from the Dutch Ministry of Economic Affairs regarding their experience implementing a data protection strategy.

  • GDPR Security Strategies

    Sponsored by: Oracle

    The GDPR is coming quickly and requires heightened security and compliance with data protection regulations. Take an in-depth look at this webcast to uncover security strategies for GDPR compliance preparation.

  • CASB Podcast

    Sponsored by: Oracle

    This brief podcast reveals the importance of Cloud Access Security Brokers (CASB) and how they can advance your security posture, without having an effect on the end users.

  • How to Get More Personal Data Without the Risk

    Sponsored by: Evident

    According to Continuum, 3.7 million personal data records are stolen every day. Take an in-depth look at this webinar to gain insight into the worsening security problem facing enterprises today, the concern about safety of personal data, and tips for choosing a verification partner.

  • How to Avoid Being the Victim of a Data Breach

    Sponsored by: Evident

    There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.

  • FBI Cyber Squad Guest Speaking on Emerging Cyber Threats

    Sponsored by: Digital Shadows

    Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.

  • Introducing the Delphix Dynamic Data Platform

    Sponsored by: Delphix

    IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.

  • EU General Data Protection Regulation

    Sponsored by: MarkLogic

    This webcast covers the importance of understanding the GDPR, and steps you can take to comply with the new regulation, with the use of a database that integrates data better and faster, and that's cost efficient.

  • Go From Compromise to Containment - Fast

    Sponsored by: Rapid 7

    According to the Verizon Data Breach Investigations Report, stolen credentials are the number one threat vector across all data breaches. Watch this webcast to uncover how you can detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing.

  • Step Up Your Security and Privacy with Data Masking

    Sponsored by: Delphix

    With data breaches occurring regularly, organizations are forced to better protect sensitive data across the enterprise. However, doing so and staying compliant is not an easy task, especially with new mandates like GDPR and HIPAA. This webcast explores how you can use data masking to keep data protected.

  • Managed Detection and Response Service

    Sponsored by: Rapid 7

    According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.

  • Comprehensive Threat Prevention Security for AWS

    Sponsored by: AWS - Check Point

    The average cost of a data breach is $6.53 million. How can you reduce your likelihood of falling victim to costly data breaches? Explore this in-depth webcast to learn about how AWS can help improve your network security by allowing you to define your cloud controls.

  • This is My Architecture – Check Point Software Technologies, Scaling Security

    Sponsored by: AWS - Check Point

    Explore this brief webcast to learn about how Check Point Software's security technology architecture works in the AWS cloud.

  • 3-Fold Approach and Best Practices to Cyber Security

    Sponsored by: Citrix

    71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.

  • Security Automation and Orchestration Best Practices

    Sponsored by: ServiceNow

    According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.

  • What is Multi-factor Authentication?

    Sponsored by: HID Global

    Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • Protecting Data After the Digital Disruption

    Sponsored by: Proofpoint, Inc.

    Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.

  • Cloud Data Management: Enabling Hybrid IT Infrastructure

    Sponsored by: Commvault

    Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.

  • As a DevOps Engineer, What Should I know about Security Tools?

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.

  • Get Your Company GDPR-Ready: Research Study Results

    Sponsored by: CA Technologies.

    The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.

  • Ready, Set, Go: General Data Protection Regulation (GDPR)

    Sponsored by: CA Technologies.

    With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.

  • New Zealand Transport Agency Customer Success Story

    Sponsored by: OpenText

    Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.

  • Hydro Tasmania Customer Success Story

    Sponsored by: OpenText

    Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.