ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Multimedia

  • Securing BYOD without MDM

    Sponsored by: BitGlass

    Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • 5 Keys to Boosting Cloud Security Confidence

    Sponsored by: BitGlass

    Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Best Practices to Securing the Cloud and SDDC

    Sponsored by: Check Point Software Technologies Ltd.

    Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.

  • The New Generation of Network Security

    Sponsored by: Juniper Networks, Inc.

    Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.

  • Ransomware, Phishing and APTs: What Can be Done

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • Top 5 Social Media Scams of 2016

    Sponsored by: Proofpoint, Inc.

    This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.

  • What to Look for in a Security Partner

    Sponsored by: Arbor Networks

    Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.

  • DDoS Mitigation Case Study - The Extra Mile

    Sponsored by: Arbor Networks

    Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.

  • The Importance of DDoS Mitigation

    Sponsored by: Arbor Networks

    In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.

  • Azure Security and Identity Management Best Practices

    Sponsored by: Rackspace

    Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.

  • Protecting mobile devices - Best practices

    Sponsored by: IBM MaaS360

    Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.

  • Gatwick Airport Drives Security Efficiency with SIM Cloud Platform

    Sponsored by: Splunk

    Discover how Gatwick Airport utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield. Learn how to utilize the cloud to soar to success with superior and secure business performance.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • 2016 Prediction in Cybercrime

    Sponsored by: WatchGuard Technologies, Inc.

    Watch this video to get a glimpse into what cybercrime will look like in the coming year.

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

    Sponsored by: LogRhythm, Inc.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.