ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Multimedia

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Dell Data Protection

    Sponsored by: DellEMC and Intel®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Security University: Cloud Security

    Sponsored by: TechTarget Security

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Security Practices for Vmware

    Sponsored by: Vyatta Inc.

    This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.

  • Mercy Health System Speeds Access to EpicCare and Increases Clinician Satisfaction

    Sponsored by: Imprivata

    This webcast demonstrates how one hospital was able to benefit from single sign-on technology that helped foster physician satisfaction while meeting HIPAA compliance regulations.

  • The Authoritative ID Store Is Dead - How Cloud Changes Provisioning

    Sponsored by: Intel

    Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning.

  • Adaptive Strong Auth & Federated SSO - The New Power Couple

    Sponsored by: Intel

    Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.

  • Introducing BlackBerry Balance™ Technology

    Sponsored by: BlackBerry

    Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.

  • The Token is Dead. Long Live the Token

    Sponsored by: SafeNet, Inc.

    View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost

  • How to Prevent Security Breaches Through Effective Management and Control of USB Devices

    Sponsored by: Lumension

    Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.

  • Lowering Risk by Applying Consistent Security Across All of Your Locations

    Sponsored by: Juniper Networks, Inc.

    Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • IBM Tivoli Security User Compliance Management Demo

    Sponsored by: IBM

    This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.

  • Ethical Hacking and Risk Assessments

    Sponsored by: Global Knowledge

    Attend this webcast to learn about risk assessment process and tools used by ethical hackers.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.