ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • How Virtualization is Transforming Technology Delivery in Healthcare

    Sponsored by: Citrix and Pure Storage

    Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security.

  • When "Free" is not Free: The True Costs of Open Source

    Sponsored by: Rogue Wave Software

    In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Building a Next-Gen Storage Infrastructure for SaaS Applications

    Sponsored by: NetApp

    Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.

  • Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard

    Sponsored by: IBM

    This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.

  • How Insiders Put Enterprise Data at Risk

    Sponsored by: Imperva

    Join Amichai Shulman, co-founder and CTO of Imperva, as he uncovers three categories of insider threats all security pros should be aware of. You'll also explore how expansive the attack can be surface for an ever-proliferating network, and how mobile devices, laptops, and desktops play a role.

  • Preventing internal Cybersecurity Breaches

    Sponsored by: Navex Global

    Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Resume Business Faster with Engineered Oracle Database Recovery

    Sponsored by: Oracle Corporation UK Ltd

    This brief video examines the only backup and recovery system co-engineered with Oracle databases and Oracle cloud. Access now to discover a zero data loss recovery appliance that will minimize the time it takes to recover your databases fully with cloud-connected automated backups that eliminate silos and vastly improve user experiences.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Modern Cybercrime: Staying Ahead of The Perfect Storm

    Sponsored by: Trustwave

    Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.

  • Next Level Threats: Stopping Ransom & CEO Email fraud

    Sponsored by: Trustwave

    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.

  • Gaining Support for ITAM: Improve IT Operations Through Data Curation

    Sponsored by: BDNA

    Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.

  • Drive Innovation with Agile Cloud Medical Imaging

    Sponsored by: Ambra

    Tune into this video to learn how Partners in Health, Memorial Hermann Health System, Barrow Neurological Institute, and the Mayo Clinic were able to streamline healthcare diagnostic image exchange, automate workflow processes, and allow anytime mobile viewing with the cloud.

  • Oracle Database Recovery Strategy

    Sponsored by: Oracle Corporation UK Ltd

    This webcast explores how to implement a backup and recovery strategy specifically designed to protect Oracle databases. Learn about a converged Oracle infrastructure that incorporates archiving, backup, and flash storage to enable fast, reliable data recovery and discover how Oracle's recovery appliance can improve your protection strategy.

  • Balancing Endpoint Security vs. End User Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Software-Defined Storage Suite Transforms Data Capabilities

    Sponsored by: IBM

    In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.

  • Case Study: i-Virtualize Builds an Agile Architecture with VersaStack

    Sponsored by: IBM

    i-Virtualize, a cloud MSP, decided to implement a pre-integrated infrastructure stack that would provide them with the flexibility and versatility necessary to respond quickly and efficiently to customers' changing business needs. Witness how this agile architecture can increase your infrastructure's efficiency while reducing your TCO and risk.

  • How to Provide Simple, Secure Access to All of Your Organization's Synced Content

    Sponsored by: IntraLinks, Inc

    You need to provide your employees with a way to work collaboratively and securely with external partners—otherwise they may put your content at risk. Watch this quick video to learn how to securely collaborate and share files with external partners.

  • Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage

    Sponsored by: Dell EMC

    David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.

  • Partners Healthcare Redefines Health IT with Data Lake Utilization

    Sponsored by: Dell EMC

    Tune into this video as Brent Richter, Associate Director of IS Operations at Partners Healthcare, illustrates a strategic solution to health IT's most important big data challenge (easy and secure access to EHRs and EMRs): data lake utilization.

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • SLA-Driven Data Protection Modernization: An ESG Video Interview

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • Achieving Maximum Backup Granularity

    Sponsored by: Veeam Software

    Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.