ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • What is Multi-factor Authentication?

    Sponsored by: HID Global

    Users and passwords can be your weakest link. Watch this brief overview of multi-factor authentication to protect your company.

  • New Zealand Transport Agency Customer Success Story

    Sponsored by: OpenText

    Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.

  • Hydro Tasmania Customer Success Story

    Sponsored by: OpenText

    Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.

  • How Splunk Enables Fast Data Science for Cybersecurity Operations

    Sponsored by: Splunk

    Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.

  • Protecting Data After the Digital Disruption

    Sponsored by: Proofpoint, Inc.

    Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.

  • Cloud Data Management: Enabling Hybrid IT Infrastructure

    Sponsored by: Commvault

    Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.

  • Agile Development to Transform Your Application Testing Program

    Sponsored by: IBM

    Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.

  • As a DevOps Engineer, What Should I know about Security Tools?

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    DevOps environments are unique because of the speed and scale at which they work. Watch this webcast to reveal characteristics regarding DevOps environments as well as the security aspects of DevOps.

  • Forensic State Analysis: A New Approach to Threat Hunting

    Sponsored by: Infocyte

    Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.

  • Top Trends Impacting IAM

    Sponsored by: Simeio

    Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • Get Your Company GDPR-Ready: Research Study Results

    Sponsored by: CA Technologies.

    The General Data Protection Regulation (GDPR) is bringing new rules and penalties for the misuse or loss of personal data. Explore the results of this Vanson Bourne research study to learn about the impacts of the GDPR, steps you can take to ready your company, enterprises' plans to purchase tools and adopt new data strategies, and more.

  • Ready, Set, Go: General Data Protection Regulation (GDPR)

    Sponsored by: CA Technologies.

    With the General Data Protection Regulation (GDPR) looming in the very near future, it's extremely important to know what it is, how you can comply, and how it may affect you. In this webinar, explore recommendations by CA Technologies that can help you prepare for the GDPR's arrival.

  • What Does The GDPR Mean To You? How To Improve Your Testing And Keep Your Test Data Compliant

    Sponsored by: CA Technologies.

    Data breaches are almost an everyday event – but the upcoming General Data Protection Regulation (GDPR) forces you to think differently about data breaches and how they impact your software development and testing process. Learn what you can do to avoid compromising your test data, and how CA Test Data Manager can help.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • Product Demonstration: Actifio SQL Data Protection

    Sponsored by: Actifio

    In this product demonstration, Learn how Actifio provides data protection for Microsoft SQL databases. Plus, explore the Actifio user interface, and uncover how it keeps your data is safe.

  • Information Governance in the Cloud: How to Build a Game Plan

    Sponsored by: Box

    Learn about information governance and how it helps protect content in the cloud and on mobile devices to meet increasing strict compliance regulations. Plus, find out how Engle Martin & Associates revitalized their content management and information governance strategy.

  • What is GDPR? And Why Should I Care?

    Sponsored by: Commvault

    The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • How UTHealth Medical Center Handles Data

    Sponsored by: Virtual Instruments

    As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.

  • Step Up Your Security and Privacy with Data Masking

    Sponsored by: Delphix

    For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.