ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Multimedia

  • Webcast: Symantec Internet Security Threat Report 2014

    Sponsored by: Symantec Corporation

    Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.

  • Are you minding your business's reputation? What can you do to mind it better?

    Sponsored by: IBM

    Changing social, cloud, and mobile technologies makes our lives smarter, more connected and more productive – but it also exposes us to bigger risks. In this video, learn about a simple tool that will help you assess how well you're managing your reputation and your IT investment.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • The Custom Defense - Your Answer to APTs

    Sponsored by: Trend Micro

    Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

  • IBM Smart Analytics System offerings powered by IBM System X Servers video

    Sponsored by: IBM

    This 8 minute video illustrates how customers can quickly turn data into insights to support analytics, reporting and BI needs with solutions built on IBM System x, IBM System Storage and IBM Software. 

  • Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance

    Sponsored by: SAP AG

    Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.

  • Virtualization Podcasts: Infrastructure Solutions for Midsized Companies

    Sponsored by: IBM

    Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.

  • Ethical Hacking and Risk Assessments

    Sponsored by: Global Knowledge

    Attend this webcast to learn about risk assessment process and tools used by ethical hackers.

  • Video: Move Beyond Efficiency to Deliver Value with IBM Service Management

    Sponsored by: IBM Software Group

    IBM Service Management can help IT organizations deliver service excellence, through a structured approach that can enable better governance and help manage risk, delivering business value. Watch this video to learn how you can deliver quality ...

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Service Management with AppManager

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

  • What's New in Group Policy Administrator 5.0

    Sponsored by: SUSE

    Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.

  • NetIQ Security Solutions for iSeries Trial

    Sponsored by: SUSE

    NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.

  • VigilEnt Policy Center 4.2 Trial

    Sponsored by: SUSE

    VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.

  • Directory and Resource Administrator 7.5 Trial

    Sponsored by: SUSE

    NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.

  • Ensuring VoIP Quality of Service

    Sponsored by: SUSE

    Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.

  • AppManager 6.0.2 Trial

    Sponsored by: SUSE

    The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.

  • Introducing AppManager 6.0

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.