ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Multimedia

  • Modernizing Data Protection

    Sponsored by: IBM

    Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.

  • Clearing the Confusion of Modern Data Protection

    Sponsored by: IBM

    One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).

  • Protecting Mission-Critical Source Code from Application Security Vulnerabilities

    Sponsored by: IBM

    In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.

  • Making the Case for Application Security Testing on Cloud

    Sponsored by: IBM

    It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Protect and Recovery Data with Confidence

    Sponsored by: IBM

    This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Streamlining Data Backup: Recovery Manager Central ChalkTalk

    Sponsored by: NTT ICT

    How can you streamline backup and recovery for an efficient use of resources? Tune into this video to leverage centralized recovery with a converged data protection solution—combining the accelerated performance of snapshots with the dedicated protection of backup.

  • Data Protection. No Limits.

    Sponsored by: NTT ICT

    This video highlights how Marriott Resorts, Mansfield Oil, and Shields Healthcare boosted the speed at which they backup and recover sensitive data with "no limits" data protection. Tune in to discover a data backup platform that performs seamlessly across all industries.

  • "Just Right" IT: Backup and Recovery Solutions Tailor-Made for SMBs

    Sponsored by: NTT ICT

    If you're running an SMB, the lifeblood of your company is data. Tune into this video to learn about adaptive storage that safeguards data across your entire business and which integrates with your existing infrastructure. Additionally, learn how to evolve backup and recovery for new and emerging threats.

  • How to Secure Your IAM System

    Sponsored by: Radiant Logic, Inc.

    Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.

  • Secure Your Growing Data with Disk-Based Backup and Recovery

    Sponsored by: NTT ICT

    Discover how to keep pace with rapid data growth while reducing cost and capacity requirements by leveraging disk-based backup architecture. Tune into this video to take advantage of rapid recovery and app integration, as well as software-defined data protection that removes the need for in-store dedicated backup at ROBOs.

  • The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator

    Sponsored by: BT

    58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.

  • Online Phishing

    Sponsored by: Navex Global

    Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.

  • Tale of the Tape: Moving Backup and Recovery to the Cloud

    Sponsored by: Iron Mountain

    Discover a cloud-based data replication solution that effectively protects and recovers data as well as boosts efficiency and connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.

  • How to Secure Your Oracle Database 12c

    Sponsored by: Oracle Corporation

    In this webcast, discover how to handle attacks on your Oracle database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both improving business for its customers and for database performance, security, and reporting.

  • Lightning-Fast Virtual System Recovery

    Sponsored by: arcserve

    Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.

  • Best Practices for Oracle Database High Availability and Data Protection

    Sponsored by: Oracle Corporation

    Hear from Bill Callahan, Director and Principal Engineer of CCC Information Services, Inc. about integrated hardware and software from Oracle that can reduce the cost and complexity of HA, eliminate data loss, increase ROI, and more.

  • See How Apps are Being Hacked

    Sponsored by: Arxan

    This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.

  • Stay One Step Ahead of Cyber Attacks

    Sponsored by: Verizon

    Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.

  • 9 steps to build a better insider threat program

    Sponsored by: Forcepoint

    While your IT system can be a witness, victim or enabler, insider threats are more than a technology problem. Policy, process, controls, risk management, auditing and monitoring all play critical roles in managing this invisible vulnerability. Watch this webcast to learn about managing and mitigating insider threats within your organization.

  • It’s Time for a “Protect From Within” Mentality

    Sponsored by: Forcepoint

    It's time to realign spending to match the most daunting and damaging threat - the insider. Take an in-depth look at how to establish an insider threat program and protect your organizations most important data.

  • Technologies to Thwart Insider Threats

    Sponsored by: Forcepoint

    Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.