ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Information Governance in the Cloud: How to Build a Game Plan

    Sponsored by: Box

    Learn about information governance and how it helps protect content in the cloud and on mobile devices to meet increasing strict compliance regulations. Plus, find out how Engle Martin & Associates revitalized their content management and information governance strategy.

  • What is GDPR? And Why Should I Care?

    Sponsored by: Commvault

    The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • How UTHealth Medical Center Handles Data

    Sponsored by: Virtual Instruments

    As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.

  • Recovering From a "WannaCry" Infection Without Paying

    Sponsored by: Actifio

    Did you get hit with a WannaCry ransomware attack? In this, demo, learn how to easily combat a WannaCry attack by using Actifio to restore your file server to a clean point-in-time and recover your files, without paying any ransom.

  • Become a Champion of PCI Compliance by Minimizing Your Attack Surface

    Sponsored by: Centrify Corporation

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

  • Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication

    Sponsored by: Centrify Corporation

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

  • The Impact of IoT in the Manufacturing Sector

    Sponsored by: Aruba Networks

    Watch this brief video to learn how to connect IoT data from sensors on disparate devices to a single, common platform that allows manufacturers to bolster security, integrate siloed data and workflows, collaboratively share insights across teams, and more.

  • How IoT-Powered Smart Offices Boost Efficiency and Innovation

    Sponsored by: Aruba Networks

    Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.

  • What the new EU data protection rules mean for IT marketers

    Sponsored by: ComputerWeekly.com

    The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.

  • Gaining Support for ITAM: Improve IT Operations Through Data Curation

    Sponsored by: BDNA

    Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.

  • Lightning-Fast Virtual System Recovery

    Sponsored by: arcserve

    Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.

  • Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk

    Sponsored by: Lookout

    Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.

  • The Essential Guide to Storage for DevOps

    Sponsored by: Tintri

    When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.

  • UBM Dark Reading & VMware AirWatch® Webinar

    Sponsored by: vmware airwatch

    In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.

  • ECM and Collaboration: Transforming Work in the Cloud

    Sponsored by: IBM

    This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.

  • Demo: Next-Gen Antivirus in Action

    Sponsored by: Carbon Black

    Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.

  • Software-Defined Storage Suite Transforms Data Capabilities

    Sponsored by: IBM

    In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.