ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • Improving Passwords is Critical to Modern Security

    Sponsored by: Verizon

    Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

  • Privacy Questions You Should Be Asking Your Cloud Service Provider

    Sponsored by: Intel Security

    Discover the questions that every cloud user should be asking their providers. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how they actually handle data security and privacy, don't assume each provider hold the same terms and conditions, and more.

  • Segmentation Beyond VLANs, Subnets, and Zones

    Sponsored by: Illumio

    Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.

  • Secure Your High-Value Assets in Half the Time

    Sponsored by: Illumio

    This webinar details a viable solution on how to rethink securing assets in a fraction of the time it usually takes. Listen in to uncover best practices such as: visualizing applications and their interactions, decoupling security from the network, making sure to stop manually reconfiguring policies, and more.

  • Pain-Free Secure App Migration

    Sponsored by: Illumio

    This webinar discusses a viable solution to reduce the pain of migrating apps to different platforms. Listen in to find out how to: "arm" every workload with its own security, gain live and interactive visibility into application topology and workload interactions, reduce your network's surface area of attack, and more.

  • Securing Access to On-Premise and SaaS Environments with Cloud-based IAM

    Sponsored by: OneLogin

    Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • Rapid Response Retainer Services

    Sponsored by: Verizon

    Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.

  • Increase productivity in a mobile world

    Sponsored by: HPE and Intel®

    Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.

  • Extending Your IT Infrastructure to the AWS Cloud

    Sponsored by: Amazon Web Services

    Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.

  • Managed Security

    Sponsored by: MASERGY

    The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.

  • What mobile policy suits your organisation?

    Sponsored by: IBM MaaS360

    Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • Total Enterprise Mobility

    Sponsored by: IBM MaaS360

    A strong enterprise mobility management (EMM) strategy is the key to success. Learn about the approaches necessary to planning the best EMM strategy for your organization and a solution that implements your plans to meet your needs.

  • Transforming Enterprise Security with Advanced Analytics

    Sponsored by: MASERGY

    Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.

  • Elevate's CISO Explains Why He Chose Masergy Managed Security

    Sponsored by: MASERGY

    One CISO was unhappy with the level of service that one managed security provider was showing. Watch this 2 minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons and why he chose to go with the provider he did.

  • Micro-Segmentation: A Demonstration

    Sponsored by: Unisys

    This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Public or Private, Instances in the Cloud Need Protection

    Sponsored by: Unisys

    Explore capabilities that conceal your instances in both private and public cloud environments.

  • Endpoint security controls

    Sponsored by: SearchSecurity.com

    Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.

  • Data loss prevention and enterprise file sync and sharing: is your data safe?

    Sponsored by: Citrix

    Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.

  • Considerations for Secure Enterprise File Sharing

    Sponsored by: Citrix

    File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.