Research Library

Powered by

Security Multimedia

  • Your Guide to Business Email Compromise

    Sponsored by: Agari

    Go in-depth on the issue of BEC attacks and what steps they take to gain personal information from companies. You'll not only how to avoid this kind of malicious activity but also how to ensure your employees are only interacting with trusted sources of emails.

  • Your Guide to Fraudulent Invoice Email

    Sponsored by: Agari

    Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.

  • Employ a Smart, Secure, and Efficient Database and Application Machine

    Sponsored by: Oracle Corporation UK Ltd

    In this webcast learn how Oracle's MiniCluster allows you to run all tiers of your application in one consolidated system. Learn how you can implement a DB system that uses all-flash storage, is built to allow for both private and public cloud integration, includes a virtual assistant, and more.

  • Ransomware, Phishing and APTs: What Can be Done About These Growing Threats

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • Ask The Analyst: Key Elements of an Effective Security Program

    Sponsored by: AlienVault

    In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by:

    This virtual event, produced jointly by ISACA,, and focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • Increase Security, Not Complexity

    Sponsored by: Fortinet, Inc.

    This short video introduces the Fortinet Enterprise Firewall, which can secure your entire network, end to end, and can scale in tandem with the increasing intricacy of attacks. View now and learn how to unlock increased security and performance without adding on unnecessary complexity.

  • Cloud Security

    Sponsored by: Hewlett Packard Enterprise

    Learn from cloud experts Ken Won and Chris Steffen about some solutions out there to combat the concerns, challenges, and realities of securing a hybrid cloud environment.

  • Securely Extend Your SharePoint® Content Externally

    Sponsored by: IntraLinks, Inc

    External content sharing requires you to strike a balance between security and productivity that is difficult to find. Access this webinar to explore the security and cost challenges of sharing beyond your firewall as well as keys to secure, timely collaboration practices.

  • Podcast: Dell Appliance for Wyse-Citrix

    Sponsored by: Dell, Microsoft and Citrix

    Tune into this podcast and learn about the Dell Appliance for Wyse-Citrix, an appliance empowering organizations to securely deliver anytime, anywhere, any device access to critical data and applications. You'll listen to experts detail the appliance infrastructure, how you can scale to meet your needs, and more.

  • Webinar: Dell Appliance for Wyse-Citrix

    Sponsored by: Dell, Microsoft and Citrix

    Explore the Dell Appliance for Wyse-Citrix – an appliance empowering organizations to securely deliver anytime, anywhere, any device access to critical data and applications. You get an in-depth look into the appliance infrastructure and how you can get started using this cost-effective appliance today.

  • SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.

  • Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

    Sponsored by: Certified Security Solutions (CSS)

    Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Rx for Embedding Security into Vulnerable Healthcare Systems

    Sponsored by: Certified Security Solutions (CSS)

    Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • Nova Southeastern University College of Dental Medicine Uses Virtualization Tools to Boost Simulation Labs

    Sponsored by: Dell, Microsoft and Citrix

    Find out how turning to desktop virtualization allowed Nova Southeast College of Dental Medicine in Ft Lauderdale, FL to provide students with the simulation lab technology needed to better prepare and train for their dental careers.

  • Nova Southeastern University College of Dental Medicine Improves Simulation Lab with Desktop Virtualization

    Sponsored by: Dell, Microsoft and Citrix

    Nova Southeast College of Dental Medicine in Ft Lauderdale, FL, found their current simulation lab technology could not deliver the training students needed to prepare their dental careers. Find out how turning to desktop virtualization tools allowed them to provide students with better planning.

  • See How the Miami Marlins Protects Sensitive Scouting and Operation Documents

    Sponsored by: Citrix

    Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.

  • AMD MxGPU Is the World's First Hardware Virtualized GPU

    Sponsored by: AMD

    Discover how you can bring the power and features of a physical GPU to VDI and learn how you can get powerful 3D rendering and secure, consistent performance across all your apps.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • What to Look for in a Security Partner

    Sponsored by: Arbor Networks

    Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.

  • DDoS Mitigation Case Study - The Extra Mile

    Sponsored by: Arbor Networks

    Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.