ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Podcast: How Sunrise Health Region is Improving the Clinician Experience through Secure and Simple VDI

    Sponsored by: Dell, Inc. and Intel®

    Tune in to this podcast to learn how Sunrise Health Region overcame long log-in times and multiple sign-in credentials from each endpoint they used daily with a VDI approach to help both users and IT.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by: SearchSecurity.com

    This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • Webinar: How Sunrise Health Region is Improving the Clinician Experience through Secure and Simple VDI

    Sponsored by: Dell, Inc. and Intel®

    Sunrise Health Region found that their current infrastructure created long log-in times and multiple sign-in credentials from each endpoint they used daily. Gain insight into how their end users and IT benefited from a VDI approach and improved clinician access, workflow, and experience, increased staff mobility on any device, and more.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Discover 6 steps to utilize any SIEM solution and maximize your network's security. Learn how to break down the evaluation, deployment, and management of your SIEM.

  • New Malware Analysis Data in OpenDNS Investigate

    Sponsored by: OpenDNS

    Learn how a threat intelligence tool can help you understand not only domain and IP data, but also file hashes. Using this expanded capacity, your security team can more thoroughly interrogate threats to your enterprise.

  • OpenDNS Umbrella

    Sponsored by: OpenDNS

    Learn about a first line of defense that can protect your IT infrastructure and monitor for emergent threats.

  • Behavioral threat analytics

    Sponsored by: SearchSecurity.com

    This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.

  • The State of Cloud Security: 2016 Survey Results

    Sponsored by: CloudPassage

    Discover expert analysis of the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • Securing Agile IT: Common Pitfalls, Best Practices and Surprises

    Sponsored by: CloudPassage

    Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general. Learn about security as a "secondary layer," removing layers from the bottom up, reducing attack surface, and more.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Stay One Step Ahead of Cyber Attacks

    Sponsored by: Verizon

    Discover a "Data Breach Investigations Report" that provides organizations with information needed to prevent attacks, quickly detect breaches, and reduce damage. Access now and get the cybersecurity intelligence necessary for successful protection.

  • The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems

    Sponsored by: Verizon

    Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.

  • Cybersecurity truth: Protection isn't enough

    Sponsored by: Verizon

    Access this short video to learn about improving your incident response time, and to gain access to the 2016 Data Breach Investigation Report.

  • Data Security for the Digital Businesses

    Sponsored by: HPE and Intel®

    How do you know if your data is secure? Uncover three questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • Improving Passwords is Critical to Modern Security

    Sponsored by: Verizon

    Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • 22 Ways Global Firms are Increasing Security in 2016 Webcast Part 1

    Sponsored by: Intel Security

    This webcast reviews security initiatives in order of their popularity for deployment. Access now to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.

  • Privacy Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.