Research Library

Powered by

Security Policies Multimedia

  • Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • Gatwick Airport Drives Security Efficiency with SIM Cloud Platform

    Sponsored by: Splunk

    Tune into this on-demand webinar now to discover how Gatwick utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield.

  • Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    Uncover key strategies for continuously preventing even the most sophisticated network attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • 2016 Prediction in Cybercrime

    Sponsored by: WatchGuard Technologies, Inc.

    Watch this video to get a glimpse into what cybercrime will look like in the coming year.

  • Ensuring Compliance and Security in the Enterprise

    Sponsored by: LogRhythm, Inc.

    Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

    Sponsored by: LogRhythm, Inc.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.

  • Security University: New network security architecture

    Sponsored by:

    Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.

  • Information Governance Symposium: Information Governance Best Practices

    Sponsored by:

    In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Next-Generation Firewalls: Breaking Through the Hype

    Sponsored by:

    This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • PCI DSS v3.0: How to Adapt your Compliance Strategy

    Sponsored by: AlienVault

    With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Security University: Cloud Security

    Sponsored by:

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • 6 Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.