ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • 3-Fold Approach and Best Practices to Cyber Security

    Sponsored by: Citrix

    71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.

  • Payer's Place in the Healthcare Ecosystem Keys to Success

    Sponsored by: HealthEdge

    Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.

  • Real- World Examples: ROI- Results

    Sponsored by: HealthEdge

    Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.

  • Cloud Security in 2 Minutes

    Sponsored by: AWS-Cisco

    Instead of adding hardware to their network, many organizations are moving to the public cloud. The problem is that this can increase your attack surface and vulnerability. Take 2 minutes to learn how entity modeling helps monitor threats, data exfiltration, and more in public clouds, private networks, and hybrid environments.

  • Cisco Stealthwatch Cloud Free Trial

    Sponsored by: AWS-Cisco

    If you want to compete in modern business, you need to adopt the cloud. You also need a way to secure your public cloud, private network, and/or hybrid environment. Access this free trial of Cisco's Stealthwatch Cloud, a software-as-a-service cloud security tool for visibility and threat detection.

  • 15 Essential DNS and DNSSEC Monitoring Tests

    Sponsored by: Men and Mice

    Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.

  • IoT Botnets: The Stakes Have Changed. Have you?

    Sponsored by: Arbor Networks

    The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT devices attract DDoS security attacks. Then, find out how your organization can shift towards a more secure and reliable IoT future.

  • IoT Botnets and DDoS Attacks: The Stakes Have Changed

    Sponsored by: Arbor Networks

    The stakes have changed for IoT botnets and DDoS attacks, are you ready? In this webcast, learn how IoT botnets quickly spread. Then, find out how your organization can shift towards a more secure and reliable IoT future.

  • Möbius Partners Helps Rent-A-Center Transform IT by Deploying a Software Defined Data Center

    Sponsored by: Mobius Partners

    Rent-A-Center was struggling to deploy thousands of virtual machines at a time for stores across the United States. Take 3 minutes to learn about a platform that enabled Rent-A-Center to accomplish all of this, gaining the ability to manage the virtual infrastructure, as well as automate, manage and control provisioning.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • How to Quickly Advance Your Security Posture

    Sponsored by: Splunk

    In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.

  • Hacking the Smartphone: A Business Email Compromise in Action

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.

  • Data Wars: A New Hope for IT & Security Insights

    Sponsored by: Splunk

    In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.

  • Analytical Stories: How I Learned to Stop Worrying and Respond to Threats

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • A Day in the Life of a GDPR Breach

    Sponsored by: Splunk

    This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • Top 5 Security Challenges Brought on by Mobile and Cloud

    Sponsored by: Entrust, Inc.

    50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.

  • The Human Factor 2017

    Sponsored by: Proofpoint, Inc.

    90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.

  • Turning the Tide Against Ransomware

    Sponsored by: Proofpoint, Inc.

    WannaCry is officially the largest ransomware outbreak in history, infecting 300,000 total endpoints. But, is it justified to ever pay a ransomware? Watch this webcast to find out.

  • Your Security Sandbox Won't Catch it all: The Phishing Problem

    Sponsored by: Proofpoint, Inc.

    Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.

  • Cloud Data Management: Enabling Hybrid IT Infrastructure

    Sponsored by: Commvault

    Moving to the cloud has its advantages, but you cannot rush the process when it comes to securely moving and managing your data. Take 1 minute to learn how intelligent hybrid IT can move your data efficiently, securely, and enable access to data when you need it.

  • Your Business Apps are Under Attack: Are you really Protected?

    Sponsored by: Alert Logic

    Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.

  • Agile Development to Transform Your Application Testing Program

    Sponsored by: IBM

    Watch this webinar to reveal how Cisco has transformed their application testing program to improve their application security.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.