ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Online Phishing

    Sponsored by: Navex Global

    Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.

  • Tale of the Tape: Moving Backup and Recovery to the Cloud

    Sponsored by: Iron Mountain

    Discover a cloud-based data replication solution that effectively protects and recovers data and boosts the efficiency of storage with high-speed reliable connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • How to Secure Your Oracle Database 12c

    Sponsored by: Oracle Corporation

    In this webcast, discover how to handle attacks on your Oracle database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both improving business for its customers and for database performance, security, and reporting.

  • Lightning-Fast Virtual System Recovery

    Sponsored by: arcserve

    Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.

  • Best Practices for Oracle Database High Availability and Data Protection

    Sponsored by: Oracle Corporation

    Hear from Bill Callahan, Director and Principal Engineer of CCC Information Services, Inc. about integrated hardware and software from Oracle that can reduce the cost and complexity of HA, eliminate data loss, increase ROI, and more.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • Stay One Step Ahead of Cyber Attacks

    Sponsored by: Verizon

    Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • It’s Time for a “Protect From Within” Mentality

    Sponsored by: Forcepoint

    It's time to realign spending to match the most daunting and damaging threat - the insider. Watch the Forcepoint™ webcast, "A Business Case for Funding Your Insider Threat Program,"for an in-depth look at how to establish an insider threat program and protect your organizations most important data.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 2

    Sponsored by: Intel Security

    Access this informative content to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • Data Security for the Digital Businesses

    Sponsored by: HPE and Intel®

    How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.

  • How CISOs Tackle Insider Threat Data Protection

    Sponsored by: Forcepoint

    Threats from within are a high priority for CISOs; even your best employees can put your data at risk. What technologies can help protect you and your employees? Hear how a real-world CISO plans, implements, and manages an insider threat program.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.

  • eCommerce Payments 101: Set up a Solid Payment Foundation

    Sponsored by: CyberSource

    This tutorial explains how to streamline the efficiency of payment security from a variety of channels and currencies as your organization scales. Discover how to automate payment operations while simplifying fraud management and payment security.

  • Success Story Video: State of California

    Sponsored by: Axway

    Find out how the State of California was able to about a managed file transfer (MFT) system to centrally manage and monitor secure file transfers across all their web sites and applications for all their agencies.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Gartner Research Director Perry Carpenter shows you how to prevent future spear phishing attacks and what capabilities your spear phishing solution needs in order to be effective.

  • How to Protect Our Digital World from Cyber Attacks

    Sponsored by: IBM

    Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.

  • Closing the Loop with Advanced Endpoint Protection and Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.

  • Modernize and Simplify the Data Center with All-Flash

    Sponsored by: EMC

    Witness how an all-flash solution with a dual active controller system that provides optimal performance, density, and cost. This simplified, flexible, modern flash solution can provide your enterprise with faster backup and recovery, integrated copy data management, built in encryption, and more.

  • Next Generation Cybersecurity: The Age of Artificial Intelligence

    Sponsored by: MASERGY

    Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.