ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Data Security for Small to Midsize Businesses

    Sponsored by: Hewlett-Packard Enterprise

    Learn how to counter the threats that are targeting your enterprise's data, productivity, revenue, and customers. Discover the questions that you need to ask yourself, such as do you have a pervasive security strategy? Are you ready for a mobile workforce? And more.

  • Mobile Security In Action: How Enterprises Are Getting Ahead of Threats

    Sponsored by: vmware airwatch

    Enterprises need to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility. Learn how Samsung is protecting its mobile employees, best practices for your own mobile security strategy, and more.

  • Leveraging Office 365 with VMware AirWatch

    Sponsored by: vmware airwatch

    As enterprises embrace adoption of Microsoft Office 365,  achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how an enterprise mobility management tool easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data security.

  • A First Look at the Future of Windows Management and Security

    Sponsored by: vmware airwatch

    Watch this 3 minute webinar to learn how unified endpoint management technologies come together to lower the cost of managing your Windows deployments, secure endpoints and data on any network across any application, and deliver peak user experience across any device.

  • An MSP Guide to Selling IT Security

    Sponsored by: Solarwinds MSP

    Discover a roadmap to enhance your MSP offering with security services, why you should take a layered security approach, and 5 tips for selling IT security. Access now and unveil how to expand upon your existing toolkit and evolve from MSP to MSSP.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    In 2016, the DDoS attack on Dyn shined a light on the inherent vulnerabilities within the internet that were never in the forefront for many IT teams, until now. Access this webinar to learn from Dyn's vulnerabilities and the value of a secondary, multi-vendor DNS strategy for resilience within your infrastructure.

  • Turn IAM from a Roadblock into a Business Enabler

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. Discover how identity-as-a-service (IDaaS) can help you reduce costs by 60%, onboard SaaS apps faster, and generate access management from a single screen.

  • Securing BYOD without MDM

    Sponsored by: BitGlass

    Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • Solving the DLP Puzzle: Tips for a Successful Deployment

    Sponsored by: Intel Security

    Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is. Check out these tips and techniques to ease common DLP pain points, and explore migration use cases.

  • Detecting and Stopping Sophisticated Cyber Attacks In the Small and Medium-Size Enterprise

    Sponsored by: Arctic Wolf Networks, Inc.

    In this webcast, op security experts discuss the latest online attacks being leveled at the small and mid-sized business, as well as current trends in malware affecting SMBs. It'll outline an array of options for enterprises that must handle today's emerging threats while maintaining a shoestring security budget.

  • Don't be the next Yahoo

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast breaks down the Yahoo data breach and explains what small and medium-sized businesses should take away from this situation.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What steps do you take to implement a mature DLP strategy? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle.

  • Incident Response

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.

  • 5 Keys to Boosting Cloud Security Confidence

    Sponsored by: BitGlass

    Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.

  • How SAIC Empowers Its Security Operations Center with Splunk

    Sponsored by: Splunk

    In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • Preventing PDF Exploits with Endpoint Security

    Sponsored by: TrendMicro

    See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.

  • Modern Cybercrime: Staying Ahead of The Perfect Storm

    Sponsored by: Trustwave

    Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.

  • Endpoint Security: The Latest Threat Protection Techniques

    Sponsored by: TrendMicro

    Discover how to protect against insider threats, ransomware, zero-day and other threats using cross-generational threat protection techniques. You'll be able to keep your end users fully protected without sacrificing speed.

  • Ransomware, Phishing and APTs: What Can be Done

    Sponsored by: Barracuda Networks

    Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and AJ Murray, IT manager at Hayward Tyler, on the rise of, and what can be done about, ransomware, phishing, and APTs.

  • SAN 2016 Incident Response Survey: The Current Threat Landscape

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.