ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security PoliciesMultimedia

  • Email Security – Virtual Appliance

    Sponsored by: Cisco Systems, Inc.

    This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.

  • ABAC to the Future: Deliver Smarter SiteMinder Policies with No Sweat

    Sponsored by: Radiant Logic, Inc.

    This webcast features a next-generation authorization strategy that offers a finer-grained approach to user provisioning. Click now to explore key benefits.

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.

    This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.

  • Rackspace and NetIQ - A Success Story

    Sponsored by: NetIQ

    This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.

  • Chalk Talk: NetIQ Cloud Access

    Sponsored by: NetIQ

    This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.

  • Enterprise Strategy Group Improving Incident Response with NetCitadel

    Sponsored by: NetCitadel

    In this video, Enterprise Strategy Group's Jon Oltsik looks at the weakness of detection-focused security strategies doomed to failure. Responding to threats is what really keeps firms out of the headlines, and organizations need to prepare properly.

  • What Security Pros Need to Know About Cloud

    Sponsored by: CloudPassage

    In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.

  • Comprehensive Cloud Security Requires an Automated Approach

    Sponsored by: CloudPassage

    This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.

  • Reassessing DDoS - Lessons Learned

    Sponsored by: Neustar®

    This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.

  • Joffe & Kindervag Explain DDoS Mitigation

    Sponsored by: Neustar®

    This crucial webcast takes an in-depth look at DDoS attacks, discussing how they became such a global threat and what your organization can do to mitigate them.

  • Demo: Easy-to-use OpenIAM Identity and Access Management

    Sponsored by: OpenIAM

    View this webcast for a demonstration on how to use a fully-integrated IAM platform that offers self-service, user lifecycle management, provisioning, and single sign-on (SSO) capabilities

  • Dell Data Protection

    Sponsored by: Dell, Inc.

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • Security University: New network security architecture

    Sponsored by: SearchSecurity.com

    Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.

  • PCI DSS v3.0: How to Adapt your Compliance Strategy

    Sponsored by: AlienVault

    With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.

  • SearchSecurity.com University- Next-generation firewalls: Breaking through the hype

    Sponsored by: SearchSecurity.com

    This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Security University: Cloud Security

    Sponsored by: SearchCloudSecurity.com

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • Information Governance Symposium: Information Governance Best Practices

    Sponsored by: SearchCompliance.com

    In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AlienVault

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • IT, IG and Compliance: The New World Order for Data Management

    Sponsored by: SearchCompliance.com

    Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.

  • The Payment Island Deconstructed

    Sponsored by: FireHost Inc.

    This webcast covers a solution that will help payment IT protect customer data while meeting compliance and performance demands.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • Security University: GRC Classroom

    Sponsored by: SearchCompliance.com

    GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.