ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Multimedia

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?

    Sponsored by: Symantec Corporation

    Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Workstation Advisor Tool

    Sponsored by: DellEMC and Intel®

    This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.

  • Optimizing for the Cloud with Data Center Virtualization

    Sponsored by: Brocade

    Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

    Sponsored by: Wave Systems Corp.

    Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.

  • NCSU - IBM PowerLinux - Industry standard Linux systems, solutions tuned to the task

    Sponsored by: IBM

    This video explores a leading solution delivering industry standard Linux systems services faster, with higher quality, and more economically than others. Learn how it combines a leading hardware, Linux software, and domain expertise of different industries resulting in higher quality operations that keep pace with modern business.

  • Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices

    Sponsored by: Dell India

    Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.