ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security PoliciesMultimedia

  • The Current State of Identity and Access Management

    Sponsored by: RSA

    This video explains the major shift with Identity and Access Management (IAM) in the past few years.

  • Managing IT Risk: Trends in Global Information Security

    Sponsored by: Hewlett-Packard Limited

    Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click

  • Securing Your Company – Where Do You Start?

    Sponsored by: NEC Corporation of America

    In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.

  • SIEM Optimization: Ensuring Compliance and Security

    Sponsored by: LogRhythm, Inc.

    This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

    Sponsored by: LogRhythm, Inc.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.

  • A Community Approach to your Enterprise Security

    Sponsored by: Hexis Cyber Solutions Inc

    This informative resource explores one company's solution and its unique community based approach to your enterprise security.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat

    Sponsored by: Radiant Logic, Inc.

    This webcast features a next-generation authorization strategy offering a fine-grained approach to user provisioning. Click now to explore key benefits.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.

  • Security University: New network security architecture

    Sponsored by: SearchSecurity.com

    Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.

  • SearchSecurity.com University- Next-generation firewalls: Breaking through the hype

    Sponsored by: SearchSecurity.com

    This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Security University: Cloud Security

    Sponsored by: SearchCloudSecurity.com

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • Information Governance Symposium: Information Governance Best Practices

    Sponsored by: SearchCompliance.com

    In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.

  • 6 Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • SIEM Optimization: Ensuring Compliance and Security

    Sponsored by: LogRhythm, Inc.

    Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

  • The Growing Role of Big Data and Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast explores the impact the looming intersection of big data and security analytics will have on your organization and explores why you should be looking forward to it.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • PCI DSS v3.0: How to Adapt your Compliance Strategy

    Sponsored by: AlienVault

    With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AlienVault

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • Security University: GRC Classroom

    Sponsored by: SearchCompliance.com

    GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.