ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • Five Tips to Make your Data Protection Strategy more proactive

    Sponsored by: Intel Security

    Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.

  • Data Exfiltration in Depth

    Sponsored by: Intel Security

    Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • Customer Spotlight | blinkbox

    Sponsored by: Barracuda Networks

    In this video, you will learn about a VOD service called blinkbox and their struggles finding solid cloud security for their platform. Watch now to see how they remediated their security issues and how they now operate without breach concerns.

  • Whiteboard: Barracuda Web Application Firewall

    Sponsored by: Barracuda Networks

    In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.

  • Enhancing the security and performance of your cloud-based applications

    Sponsored by: Verizon

    This video shows you how you can securely connect to a variety of leading cloud providers through advanced network services, giving you a reliable end-to-end experience for all your cloud-based applications. Watch now to discover secure, on-demand connectivity to drive growth, improve business performance and gain a competitive advantage.

  • Prevent Email Breaches with Zix

    Sponsored by: ZixCorp

    This video shows you how to put an end to email data loss and misplaced attachments. Access now to learn how you can get a second chance at catching mistakes and add another layer of authorization before sending out important information.

  • ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.

  • Behavior-Based Threat Detection

    Sponsored by: eSentire

    This video shows you behavior-based threat detection that scans your network for a multitude of different anomalies. It combines time of day, bandwidth surges, IP reputation and port scanning to identify possible threats to your network security. Access now to learn about always on full traffic forensics.

  • Don't Be the Next Cyber Victim

    Sponsored by: eSentire

    The best way to manage the complexities of cybersecurity is to simplify it. Micro-incident response has the capability to protect your network 24/7, 365 days per year. Access now to stop small breaches from turning into business-ending catastrophes.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.

  • Protect Your Computer Screen With OptioLabs' OptioAware

    Sponsored by: OptioLabs

    In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.

  • Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction

    Sponsored by: OptioLabs

    This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.

  • Demo of OptioAware by OptioLabs

    Sponsored by: OptioLabs

    View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.

  • Webinar - Network security without compromise

    Sponsored by: Aruba Networks

    In this webcast, you will learn how to enhance network security, enforcement and a better user experience.

  • Adaptive Mobile Protection: The need for user endpoint context

    Sponsored by: Aruba Networks

    This webcast teaches you about the changing threat landscape and best practice you should implement for top notch mobile security.

  • Take control of your data center: Streamline and protect your IT environment

    Sponsored by: BMC

    Are you using data center automation to streamline and protect your IT environment? Discover how to deliver a higher level of security and compliance, accelerate vulnerability resolution and avoid major security incidents.

  • Scaling big data analytics

    Sponsored by: LogRhythm, Inc.

    This video shows you how to reduce to the time to detect and respond to threats as they come through your network. Find out how you can use machine-driven, real-time behavioral analytics, rapid forensic search and automated response to keep your network safe.

  • Neutralization of a Phishing Attack

    Sponsored by: LogRhythm, Inc.

    This video shows you a solution for faster detection and response. Gain unified security intelligence and analytics and end to end threat lifecycle management through this read.

  • Cloud Based Data Protection

    Sponsored by: arcserve

    This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.