Research Library

Powered by

Data Security Multimedia

  • Find The Right Cloud Service Provider For Your Organization

    Sponsored by: VMware

    Watch this brief video to examine a cloud network that provides customers with unprecedented levels of extensibility, flexibility, and choice of public and hybrid cloud services.

  • Safeguard Your Data, Productivity, and Reputation with Business Continuity and Resiliency

    Sponsored by: IBM

    This video focuses on a cloud managed backup resilience service that can help you attack threats head-on with customized consulting and cloud-based technologies to keep your data and your business always on. Watch this video to see how you can proactively defend your business against the unexpected.

  • HGST Strengthens CrossFit Data Storage

    Sponsored by: HGST

    This video details how one health and fitness company was able to increase efficiency and simplify storage management using an active archival system. Tune in to learn how you can lower your storage total; cost of ownership, easily scale capacity and performance, increase resiliency, and more.

  • Making "Things" Secure: Towards a Safer Internet of Things

    Sponsored by: Symantec Corporation

    This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.

  • Threat Intelligence Networks: The Next Generation

    Sponsored by: Symantec Corporation

    This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.

  • Discovering the New Business Case for Cybersecurity

    Sponsored by: Symantec Corporation

    This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.

  • Data Archiving for Financial Services

    Sponsored by: Proofpoint, Inc.

    Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.

  • Reduce Attack Surface and Compliance Risks with Unified Threat Protection

    Sponsored by: Proofpoint, Inc.

    In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.

  • Smart Parking and the Evolution of the Hybrid Cloud Service Provider

    Sponsored by: IBM

    This video depicts smart parking as an example of cloud services allowing enterprises to access data in real time without having to worry about data protection or management challenges. Watch how hybrid cloud service providers are evolving to providing more services that can make your enterprise's data processes efficient and easy to manage.

  • Why Your Cybersecurity Needs to Advance

    Sponsored by: BitDefender

    This brief video discusses the dangers of traditional security and the importance of embracing sophisticated security measures. Take a look to learn how improving your security architecture can stop the rise of cybercrime.

  • Automate Your Enterprise Apps to Ensure Secure Mobile Data Access

    Sponsored by: Citrix

    In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.

  • How John Lewis Streamlined IT Operations

    Sponsored by: Splunk

    In this webcast, learn how leading retailer John Lewis has been able to finely tune its e-commerce customer experience using an operational intelligence tool. See how this has led to rapid growth in online sales and better efficiency across the company.

  • Set the bar on your Hadoop Security with HDP 2.3

    Sponsored by: Hortonworks

    Access this video now to uncover how your enterprise can secure its data using a gateway for perimeter security, provide fine grain authorization and auditing for all access patterns and ensure data encryption over the wire as well as stored on disk. Watch now to learn more.

  • Telehuset Case Study: Backup Fit For MSPs

    Sponsored by: Barracuda Networks Inc.

    This video shows how one MSP company was able to improve their backup quality by moving to a stable, easy to use, backup system. Tune in to learn how you can improve backup times and quality at your organization.

  • Case Study: MSP Uses Data Backup for Efficient Data Center Management

    Sponsored by: Barracuda Networks Inc.

    Access this video to see how one MSP provider was able to implement a data backup solution, allowing them to run an efficient data center and meet the scalability requirements of their clients. Watch now to see their success story.

  • Storage Assessment Tool: How Much Inactive Data is Too Much?

    Sponsored by: FujiFilm Dternity

    This IT download provides you with a tool that can assess your stored files and give you a comprehensive analysis of the makeup of your file environment. Click now so that you can reduce your storage management time as well as costs associated with file storage.

  • Classify and Secure All Your Sensitive Data

    Sponsored by: Identity Finder, LLC

    This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.

  • Best Practices for Classification Techniques and Data Protection

    Sponsored by: Identity Finder, LLC

    In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.

  • Case Study: How West Virginia University Reduced Its Sensitive Data Footprint

    Sponsored by: Identity Finder, LLC

    In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.

  • Trusted Computing in a Hybrid Cloud Environment

    Sponsored by: Intel and IBM

    In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • An Examination of Web App Security Process Management

    Sponsored by: WhiteHat Security

    In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.

  • Why InfoSec Needs Guarantees

    Sponsored by: WhiteHat Security

    This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.

  • An Innovative Approach to Encrypted Network Security

    Sponsored by: Unisys

    This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.

  • File Sharing Insecurity: The Final Data Leakage Frontier

    Sponsored by: FinalCode

    In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.