ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • eCommerce Payments 101 (Part 2)

    Sponsored by: CyberSource

    Tune into this brief video to discover how to automate payment operations while simplifying fraud management and payment security. Watch this tutorial to streamline the efficiency of payroll in your financial organization, and get the lowdown on securing online payments.

  • Success Story Video: State of California

    Sponsored by: Axway

    They were able to build their website quickly using a managed file transfer (MFT) system. Learn how they now centrally manage and monitor secure file transfers across all their sites and applications for all their agencies.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Cloudmark's VP of Product Management, Kevin San Diego and Gartner Research Director Perry Carpenter will tell you how to prevent future spear phishing attacks and what capabilities a spear phishing solution needs to include in order to be effective.

  • Encompass analytics and transaction processing with one platform

    Sponsored by: IBM

    Infrastructure is vital to retrieving value from your data. Watch this brief video to learn about an end-to-end solution that brings analytics and transaction processing to your data, minimizing cost and complexity risk associated with moving data to another platform, and keeps everything you need in one platform.

  • Case Study: How Republic Bank Monitors, Protects Sensitive Data

    Sponsored by: Imperva

    See how a national bank managed 100% uptime over a three-year period and ensured compliance across all servers in all locations. Learn how you can leverage behavioral analytics to mitigate risk and ensure that unauthorized personnel do not access sensitive client information.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

  • How to Protect Our Digital World from Cyber Attacks

    Sponsored by: IBM

    Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.

  • Closing the Loop with Advanced Endpoint Protection and Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.

  • B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions

    Sponsored by: Axway

    In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.

  • Modernize and Simplify the Data Center with All-Flash

    Sponsored by: EMC

    Witness how an all-flash solution with a dual active controller system that provides optimal performance, density, and cost. This simplified, flexible, modern flash solution can provide your enterprise with faster backup and recovery, integrated copy data management, built in encryption, and more.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • Understanding the Impact of Flash Storage in Healthcare Environments

    Sponsored by: Pure Storage

    Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

  • Building a Digital Business on an Integration Foundation

    Sponsored by: Axway

    In today's connected world, all of your company's data needs to be managed, visualized and integrated into business processes to secure the future of your digital ecosystem. Learn how to best protect the giant influx of complex data flow and monitor this data end-to-end as it flies through your ecosystem.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Tune in to discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

  • Making the Most of Hybrid Cloud for Future-Proofed Data Storage

    Sponsored by: Equinix

    Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.

  • Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud

    Sponsored by: Equinix

    Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.

  • Case study - Cherokee Investment Co.

    Sponsored by: Citrix

    Secure file sync and sharing is of high importance to every business. When a massive amount of information is being shared on a daily basis, maintaining security can seem like a full-time job. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.

  • Making the Most of Hybrid Cloud for Backup and Archiving

    Sponsored by: Equinix

    Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Access now to see how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.