ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Why mitigating risk remains difficult: Overview of GigaSECURE Security Delivery Platform

    Sponsored by: Gigamon

    Discover how to shift your security strategy from perimeter defenses towards a detect and protect framework gaining greater visibility in the process.

  • Transition to a More Flexible Infrastructure with Software-Defined Storage

    Sponsored by: IBM

    Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.

  • SLA-Driven Data Protection Modernization: An ESG Video Interview

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • Achieving Maximum Backup Granularity

    Sponsored by: Veeam Software

    Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.

  • Data Access Governance Solutions On-Demand Demo

    Sponsored by: STEALTHbits

    This 60-minute webinar will teach you how your organization can implement a concrete data access governance program that won't break your back, or the bank. You'll learn both tactical and strategic approaches to unstructured data management and have your most important questions answered along the way.

  • Automated Test Data Creation: An IT Manager's Review

    Sponsored by: CA Technologies

    Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.

  • For Boundless Data, You Need Limitless Storage: 2016 Storage Updates

    Sponsored by: Red Hat

    See what's new in storage: learn how to scale across physical, virtual, cloud, and hybrid environments with a software-defined platform that limitlessly accommodates today's explosive data influx. Tune into this brief video as experts explain how this data management platform streamlines file and object access, and more.

  • Six Key Performance and Sizing Considerations When Creating Your Software-Defined Storage Cluster

    Sponsored by: Red Hat

    Designing a software-defined storage (SDS) cluster can be a complicated exercise—and one size certainly does not fit all. This webcast details the six key performance and sizing considerations to keep in mind when you create your SDS cluster.

  • IBM Data Protection Modernization and Strategy: An ESG Webinar

    Sponsored by: IBM

    In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.

  • ESG Video Interview: Virtualization-Driven Data Protection Modernization

    Sponsored by: IBM

    ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.

  • Simplified Data Protection for the Modern Enterprise: An Expert Evaluation

    Sponsored by: IBM

    Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • Modernizing Data Protection

    Sponsored by: IBM

    Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.

  • Clearing the Confusion of Modern Data Protection

    Sponsored by: IBM

    One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Learn how identity management as a service (IDaaS) can help you modernize your IAM and roll out applications as quickly as possible while ensuring your data is kept secure.

  • Protect and Recovery Data with Confidence

    Sponsored by: IBM

    This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Ransomware: The Identity of Attackers

    Sponsored by: OpenDNS

    Ransomware. It's everywhere, with thousands of infections daily, and unknown millions being made by unknown entities. This podcast looks at ransomware and how the cybercrime business operates.

  • Streamlining Data Backup: Recovery Manager Central ChalkTalk

    Sponsored by: NTT ICT

    How can you streamline backup and recovery for an efficient use of resources? Tune into this video to leverage centralized recovery with a converged data protection solution—combining the accelerated performance of snapshots with the dedicated protection of backup.

  • Data Protection. No Limits.

    Sponsored by: NTT ICT

    This video highlights how Marriott Resorts, Mansfield Oil, and Shields Healthcare boosted the speed at which they backup and recover sensitive data with "no limits" data protection. Tune in to discover a data backup platform that performs seamlessly across all industries.

  • "Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs

    Sponsored by: NTT ICT

    If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.

  • How to Secure Your IAM System

    Sponsored by: Radiant Logic, Inc.

    Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.

  • Secure Your Growing Data with Disk-Based Backup and Recovery

    Sponsored by: NTT ICT

    Discover how to keep pace with rapid data growth while reducing cost and capacity requirements by leveraging disk-based backup architecture. Tune into this video to take advantage of rapid recovery and app integration, as well as software-defined data protection that removes the need for in-store dedicated backup at ROBOs.

  • The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator

    Sponsored by: BT

    58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.