ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Multimedia

  • Simplify Saas and On-premises Integration

    Sponsored by: Oracle Corporation

    Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.

  • Data Security: Preparing for the Compliance Landscape of Tomorrow

    Sponsored by: Absolute Software

    Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.

  • Building a Layered Defense Against Data Breaches

    Sponsored by: Absolute Software

    This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.

  • Avoiding the Headlines: 5 Critical Security Practices to Implement Now

    Sponsored by: CloudPassage

    Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.

  • Turning Compliance into an Opportunity

    Sponsored by: Hewlett-Packard Limited

    Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.

  • Crafting the Business Case for Better Security

    Sponsored by: FireEye

    This paper provides step-by-step instructions on how to craft a clear and persuasive business case for advanced security.

  • Security Lessons Learned from 2014

    Sponsored by: ESET

    This webcast discusses some of the most prevalent threats of 2014 and the lessons learned from them.

  • Balancing Mobile Security with End-User Satisfaction

    Sponsored by: MobileIron

    Access this short video to find out how one company can successfully protect your mobile devices and applications, without frustrating your employees.

  • 2015 Cybersecurity Legislation

    Sponsored by: ESET

    This webcast gives you the background you need on proposed cybercrime laws and how they impact you.

  • Applying the Top 20 Critical Security Controls to the Cloud

    Sponsored by: CloudPassage

    This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.

  • Next-Generation Firewalls: Breaking Through the Hype

    Sponsored by: SearchSecurity.com

    This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Multifactor Authentication Security School

    Sponsored by: SearchSecurity.com

    In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.

  • Managing IT Risk: Trends in Global Information Security

    Sponsored by: Hewlett-Packard Limited

    Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click

  • SIEM Optimization: Ensuring Compliance and Security

    Sponsored by: LogRhythm, Inc.

    This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.

  • Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches

    Sponsored by: LogRhythm, Inc.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.

  • Security University: New network security architecture

    Sponsored by: SearchSecurity.com

    Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.

  • Information Governance Symposium: Information Governance Best Practices

    Sponsored by: SearchCompliance.com

    In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.

  • Take Control of Critical Information for Your Employees' Sake

    Sponsored by: Clearswift

    This webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • PCI DSS v3.0: How to Adapt your Compliance Strategy

    Sponsored by: AlienVault

    With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Security University: Cloud Security

    Sponsored by: SearchCloudSecurity.com

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • 6 Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.