ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Multimedia

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Top 5 Social Media Scams of 2016

    Sponsored by: Proofpoint, Inc.

    This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • What to Look for in a Security Partner

    Sponsored by: Arbor Networks

    Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.

  • DDoS Mitigation Case Study - The Extra Mile

    Sponsored by: Arbor Networks

    Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.

  • The Importance of DDoS Mitigation

    Sponsored by: Arbor Networks

    In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.

  • Facing up to Mobile Security Challenges

    Sponsored by: IBM MaaS360

    Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • HDAP: the Big Data LDAP Directory Storage

    Sponsored by: Radiant Logic, Inc.

    In this exclusive webcast, learn more about highly available directory access protocol (HDAP), which combined with identity virtualization and federation tools, offers more support, scalability, and performance for identity storage than LDAP.

  • Advanced Endpoint Protection & Forensics

    Sponsored by: Check Point Software Technologies Ltd.

    Uncover key strategies for continuously preventing even the most sophisticated network attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.

  • Security University: New network security architecture

    Sponsored by: SearchSecurity.com

    Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • 2016 Prediction in Cybercrime

    Sponsored by: WatchGuard Technologies, Inc.

    Watch this video to get a glimpse into what cybercrime will look like in the coming year.

  • Secure, Efficient File-Sharing

    Sponsored by: FinalCode

    This brief video looks at a security system that keeps files safe without altering the way employees share them.

  • Next-Generation Firewalls: Breaking Through the Hype

    Sponsored by: SearchSecurity.com

    This SearchSecurity School resource cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This informative webcast discusses how you can ensure that your identity and access management (IAM) environment is prepared for Office 365, including handling authentication and managing directory requirements.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • PCI DSS v3.0: How to Adapt your Compliance Strategy

    Sponsored by: AlienVault

    With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.