ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    Industry expert, Kevin Beaver discusses best practices in approaching and addressing ransomware. Access this podcast to uncover real-world stories and practical advice on how you can make ransomware a manageable threat that can be mitigated without impacting business operations.

  • Taking a Proactive Approach to Addressing Ransomware

    Sponsored by: AttackIQ

    In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.

  • Key Features To Consider When Deciding On A NGFW Technology

    Sponsored by: Forcepoint

    There are 3 main drivers to your NGFW technology deployment success: integration with security workflow, total cost of ownership, and security effectiveness. But which one will work best for your distributed enterprises? In this webcast, learn key features to consider when selecting your technology, and discover insights on the testing process.

  • Top 5 Risk Mitigations In a Cloud-First World

    Sponsored by: Forcepoint

    Dive head-first into risk mitigation on the cloud with this webcast featuring experts Neil Thacker and Adrian Sanabria as they discuss 5 ways to make sure your cloud is secure and handled properly.

  • Security in a Mobile First World

    Sponsored by: AVST

    Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.

  • Timing the Perfect ADC Vendor Refresh

    Sponsored by: A10 Networks

    Today's market is all about the app, and consumers care about one thing: accessing them from anywhere, anytime, and above all - securely. Learn how a smart application delivery controller vendor refresh will improve performance, security, management and support..

  • Securely Bridge Traditional and Cloud Application Environments

    Sponsored by: A10 Networks

    Access this webinar to uncover how to securely manage your ADCs, deliver secure application services across multiple environments and learn how to detect and mitigate DDoS attacks against your applications and business.

  • Top 5 Requirements for Cloud-Native Application Traffic Management & Security

    Sponsored by: A10 Networks

    Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.

  • 6 Questions Every CIO Should Ask About Cloud Security

    Sponsored by: IBM

    Delve into IT security risks, concerns, and troubles that enterprises run into when looking to secure their cloud in conjunction with their cloud providers. Discover why these issues arise, and what can be done about them.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Cybersecurity Essentials for 2017

    Sponsored by: Neustar

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine essential cybersecurity trends and highlight key tactics to better prepare you for what the coming year may bring.

  • Respond to Threats Faster and More Effectively Than Ever

    Sponsored by: ServiceNow

    Learn how to respond faster than ever to threats by collecting data from your security tools and automating processes, sorting each risk by severity and how much damage they could do to your organization.

  • Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017

    Sponsored by: Neustar

    Discover if your current DNS strategy stacks up to the next generation of internet demands. Learn why it makes sense to have a backup DNS provider, what IoT insecurities threaten your business, and more.

  • Why Mobile Devices are the Biggest Enterprise Security Threat

    Sponsored by: BlackBerry

    Enterprises are losing the security battle and mobile devices are the biggest threat. In this webcast, learn effective ways to manage risks and mitigate threats associated with mobile devices and how mobile security can enable your business and employees to be more productive.

  • Data Security for Small to Midsize Businesses

    Sponsored by: Hewlett-Packard Enterprise

    Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.

  • Turn IAM from a Roadblock into a Business Enabler

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.

  • Solving the DLP Puzzle: Tips for a Successful Deployment

    Sponsored by: Intel Security

    Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is. Check out these tips and techniques to ease common DLP pain points, and explore migration use cases.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.

  • Balancing User Productivity and Security

    Sponsored by: RES Software

    Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Modern Cybercrime: Staying Ahead of The Perfect Storm

    Sponsored by: Trustwave

    Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.

  • Ransomware, Phishing and APTs: What Can be Done

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • Detect Ransomware Before its's Too Late

    Sponsored by: AlienVault

    View this webcast to discover how to detect malware threats quickly, saving you valuable clean-up time by limiting potential damage.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.