ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • Understanding the Impact of Flash Storage in Healthcare Environments

    Sponsored by: Pure Storage

    Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

  • Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    In today's connected world, all of your company's data needs to be managed, visualized and integrated into business processes to secure the future of your digital ecosystem. Learn how to best protect the giant influx of complex data flow and monitor this data end-to-end as it flies through your ecosystem.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Tune in to discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

  • Making the Most of Hybrid Cloud for Future-Proofed Data Storage

    Sponsored by: Equinix

    Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • Citrix ShareFile case study - Cherokee Investment Co.

    Sponsored by: Citrix

    Secure file sync and sharing is of high importance to every business. When the massive amount of information being shared on a dailty basis, maintaining security can seem like a full-time job. Watch this video now to learn about a solution that enables secure file sharing and mobility.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Access now to see how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

  • Making the Most of Hybrid Cloud for Future-Proofed Data Storage

    Sponsored by: Equinix

    Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • Prevent Email Breaches with Zix

    Sponsored by: ZixCorp

    This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.

  • Case Study: County of San Mateo Meets Data Regulation Needs with Data Management Software

    Sponsored by: Commvault

    Watch this brief webcast now to learn about the County of San Mateo's implementation of a data management software that balanced their different legal and regulatory requirements for data protection. See how this solution can provide your enterprise with the flexibility needed to meet changing customer requirements and government regulations.

  • Top 10 ShareFile Enterprise features IT teams can’t live without

    Sponsored by: Citrix

    When deciding on an enterprise file sharing solution, it is important to consider what features your organization will utilize most. This video reveals the top 10 most frequently used features of one such solution and explains the importance of each one.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Considerations for Secure Enterprise File Sharing

    Sponsored by: Citrix

    File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.

  • On-demand Webcast: Top Security Challenges and Best Practices when Moving to the Cloud

    Sponsored by: Intel Security

    Learn about the latest research into secure cloud computing from some of the leading authorities in the industry, such as the foremost security guru from the Cloud Security Alliance, Jim Reavis. You discover how perceptions about cloud computing and security continue to impact adoption, best practices for choosing a secure cloud provider.

  • Case Study: Veterans United Home Loans Simplifies Their Data Management

    Sponsored by: Commvault

    Watch this webcast to see how Veterans United Home Loans implemented a flexible data management solution that enabled them to manage their data at multiple sites and provide reliable services to their customers. Access now to learn more about this resilient, scalable, and secure solution.

  • The IoT Journey: Freight Farms Conquers Data Challenges

    Sponsored by: Xively by LogMeIn

    Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.

  • Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management

    Sponsored by: Commvault

    In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.