ComputerWeekly.com Research Library

Powered by Bitpipe.com

Government Agencies (non-U.S.) Multimedia

  • How to Prevent Security Breaches Through Effective Management and Control of USB Devices

    Sponsored by: Lumension

    Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.

  • How One Solution Handled Federal Government Security Demands

    Sponsored by: Riverbed Technology, Inc.

    The U.S. government has big IT needs in security and performance. Discover a single solution that met all expectations.

  • Welcome to a New Era of Digital Government

    Sponsored by: Okta

    Every online interaction, no matter how big or small, begins with an identity.In order to best serve the public, governments need to make sure every one of their digital experiences is centered around a human. Watch this video to learn more.

  • The Critical Security Controls – Moving Beyond the Checklist Mentality

    Sponsored by: Lumension

    The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  • Virtual Desktop Solutions in the Federal Government

    Sponsored by: VMware, Inc.

    This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations.

  • Endace Video 11

    Sponsored by: Endace

    In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • Custom Express Do and Don't

    Sponsored by: TechTarget

    Custom Express Do and Don't

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.