ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Composite Authentication: Security Beyond Passwords

    Sponsored by: Crossmatch

    The human factor makes passwords far too weak. Time to take them out of the equation. Discover what composite authentication is, how it evolved, and what its place in the future of security is.

  • How the Internet of Things Is Transforming Industries and the Nature of Work

    Sponsored by: Hewlett Packard Enterprise

    Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.

  • Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace

    Sponsored by: Aruba Networks

    Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network

  • Security Monitoring Solved: An Expert Path to Clairvoyant Defense

    Sponsored by: IBM

    Security monitoring is essential for staying ahead of the threat landscape. In this exclusive webinar featuring Forrester Research, uncover the criteria for evaluating vendors, the benefits of integrated security platforms and much more.

  • The Next Security Frontier: Automation, Things and Intelligent Machines

    Sponsored by: IBM

    How can you effectively match the progress of emerging threats even within the newest, most promising areas of security, such as AI and DevSecOps? Register for this virtual conference taking place on June 27th 2017, 8:15am – 5:00pm EDT, and get the answers you're looking for.

  • The Current State of Open Source Software

    Sponsored by: Flexera Software

    With open source software's explosion of popularity, organizations need to know how much of a risk these components present to their business. Learn the reasons behind the massive increase in OSS usage, the risk it carries and how to gain deep analysis to give you actionable insight.

  • An Introduction to Open Source Licensing: A Legal Perspective

    Sponsored by: Flexera Software

    There is a lot of confusion when it comes to open source software (OSS). Discover a detailed presentation from expert Andrew Hall on what OSS is and its fundamentals, risks, benefits, obligations, restrictions, and how to ensure your organization is protected.

  • Waste Less Time Fighting Ransomware

    Sponsored by: Comstor

    Don't become another ransomware casualty in their growing number of attacks. Learn the inner working of the modern ransomware threat, as well as how to prevent and contain it from harming your organization.

  • Become a Champion of PCI Compliance by Minimizing Your Attack Surface

    Sponsored by: Centrify Corporation

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

  • Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication

    Sponsored by: Centrify Corporation

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

  • Automating Your Corporate Mobility Management

    Sponsored by: Cisco Jasper

    In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.

  • Ivanti Workspace Management - Secure and Optimize the Citrix Workspace

    Sponsored by: Citrix Ready

    Attend this webinar to find out how the Ivanti products can help protect and secure Citrix desktops against ransomware, control application usage, reduce the number of Citrix images, and personalize users environments regardless of how they access their desktop. Accelerate your move to Citrix platforms and the Citrix cloud with Ivanti solutions.

  • Evaluating Mobility Management Solutions for Common Use Cases

    Sponsored by: Citrix

    Digital workspaces are the next logical step in enhancing productivity and security, and providing users with the seamless experiences they need – whether they are travelling, remote, or roaming users. Download this webcast to discover what a digital workspace is comprised of, use cases, and how it can benefit your organization.

  • Power of Proxy in Security

    Sponsored by: Symantec & Blue Coat Systems

    With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more.

  • What Continuous Data Protection Looks Like

    Sponsored by: Dell EMC and Intel®

    Discover how to reduce risk while saving time and money securing your data center, whether you are looking for converged or hyper-converged systems to meet the right use case for your organization.

  • Symantec GDPR

    Sponsored by: Symantec & Blue Coat Systems

    With severe financial penalties for GDPR non-compliance, enterprises can't just plan to afford to pay the fine. Discover what your organization needs to help prepare for the GDPR in May 2018.

  • Cloud-Based Cybersecurity for Industrial IoT Apps

    Sponsored by: Bayshore Networks

    In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.

  • Advancing Infratsructure to Containers and Beyond

    Sponsored by: CoreOS

    Security has become a relative phrase. We may think we're secure, but it only ever takes that one bug to bring your organization down. It's time to think about security in a new way. Watch this lecture from CoreOS CEO Alex Polvi, and find out how containers could help your organization stay secure.

  • Steps to Secure the Industrial Internet of Things

    Sponsored by: Bayshore Networks

    By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).

  • Interview: The Growing Security Concerns of Industrial IoT

    Sponsored by: Bayshore Networks

    In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.

  • Helping Companies Stay Secure with Machine Data

    Sponsored by: Splunk

    Watch this interview with Splunk CEO Douglas Merritt to learn about how his analytics program can help protect your organization by delivering analytics from all sectors of your business, creating a hybrid view of on-prem and cloud systems, and more.

  • Harnessing Analytics For Security Investigation

    Sponsored by: Splunk

    Watch this video to learn how you can harness the power of analytics software to easily detect anomalies in the endpoint, so you can prevent and mitigate advanced malware such as ransom ware.

  • Splunk Everywhere! Ransomware

    Sponsored by: Splunk

    Learn how you can compete with the rising threat of ransomware in this webcast, by using a real-time analytics-based program which allows your security to be adaptive and respond to ransomware attacks at machine speed.

  • Building and Instrumenting the Next Generation SOC

    Sponsored by: LogRhythm, Inc.

    Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.

  • Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk

    Sponsored by: Lookout

    Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.