ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Multimedia

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • Securing Agile IT: Common Pitfalls, Best Practices and Surprises

    Sponsored by: CloudPassage

    Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general. Learn about security as a "secondary layer," removing layers from the bottom up, reducing attack surface, and more.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems

    Sponsored by: Verizon

    Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • Rapid Response Retainer Services

    Sponsored by: Verizon

    Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Video: Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • 2016 Prediction in Cybercrime

    Sponsored by: WatchGuard Technologies, Inc.

    Watch this video to get a glimpse into what cybercrime will look like in the coming year.

  • How Enterprises Are Attacking the Cloud Security Challenge

    Sponsored by: CloudPassage

    The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.

  • Applying the Top 20 Critical Security Controls to the Cloud

    Sponsored by: CloudPassage

    This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.

  • Ensuring Compliance and Security in the Enterprise

    Sponsored by: LogRhythm, Inc.

    Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

    Sponsored by: LogRhythm, Inc.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Next-Generation Firewalls: Breaking Through the Hype

    Sponsored by: SearchSecurity.com

    This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.