ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Multimedia

  • As a DevOps Engineer, What Should I know about Security Tools?

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to uncover what you should know about security tools and protection in order to properly secure your DevOps.

  • IT Security and the Devops Environment

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal how to improve application and infrastructure security and to engage in methods of delivering security that don't interrupt the fast flow and time to delivery.

  • Proactively Protect Against Ransomware

    Sponsored by: CyberArk Software, Inc

    Watch this webcast to reveal steps your organization can proactively take to prevent and not react to the threat of ransomware.

  • Forensic State Analysis: A New Approach to Threat Hunting

    Sponsored by: Infocyte

    Watch this SANS Institute webcast to uncover strategies to reduce the dwell time of attackers and improve your threat hunting techniques.

  • Managing External Identities

    Sponsored by: Simeio

    Listen to this webinar to uncover approaches to enhance your IAM security as well as customer experience.

  • What is GDPR? And Why Should I Care?

    Sponsored by: Commvault

    The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • Cisco Umbrella Investigate: Threat Intelligence Overview

    Sponsored by: Cisco Umbrella

    Enterprises today face huge challenges in information security. Attackers are waiting around every corner to cause damaging breaches. In this brief overview, learn about Cisco Umbrella Investigate, which provides threat intelligence about domains and IPs across the Internet.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Security Product Overview: Cisco Umbrella

    Sponsored by: Cisco Umbrella

    Over 1/2 of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.

  • Reduce the Risks and Costs Associated with Software Assets and Licensing

    Sponsored by: Snow Software

    Organizations around the world spend over an estimated $330 billion on enterprise software every year. Software asset management (SAM) is designed to help you keep track of all your software licensing data, ensure compliance, and prevent overspending. Watch this 2 minute video to see how SAM will save your bottom line.

  • Key Features To Consider When Deciding On A NGFW Technology

    Sponsored by: Forcepoint

    There are 3 main drivers for a NGFW technology deployment: integration with security workflow, total cost of ownership, and security effectiveness. In this NSS Labs webcast, learn market trends for NGFWs and uncover key features to consider when selecting an NGFW technology.

  • Outsmarting Ransomware: Protect Your Money and Assets

    Sponsored by: arcserve

    Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.

  • Step Up Your Security and Privacy with Data Masking

    Sponsored by: Delphix

    For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Neutralize Emerging Threats: Reducing the Time to Discover and Recover Webcast

    Sponsored by: Intel Security

    Organizations are looking for a new way to approach security to eliminate penetration and reduce time to recovery. Understand the full picture of an attack - not just the device the attack took place on, but the context around the attack. Learn how to best remediate threats and gain greater visibility into your network happenings.

  • Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure and shows you four key areas to focus on when implementing a new, more efficient security solution.

  • Why Traditional Security Approaches Fail

    Sponsored by: Intel Security

    Learn from security expert Candace M. Worley as she points out critical areas of failure in modern security infrastructure. Uncover 4 key areas to focus on when implementing a new, more efficient security strategy.

  • Security Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.