ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results

    Sponsored by: Intel Security

    A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from this year's Data Breach Investigation Report.

  • Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

    Sponsored by: Certified Security Solutions (CSS)

    Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology.

  • Get Smarter Control of Your Certificates and User Keys Right Now

    Sponsored by: Certified Security Solutions (CSS)

    In this webinar IT experts Ted Shorter and Matthew McKenna join forces to outline common enterprise challenges, risks, and best practices related to controlling digital certificates and SSH user keys. Learn how to reduce risk, meet and exceed audit requirements, and streamline disparate complex IT and security workflows.

  • Rx for Embedding Security into Vulnerable Healthcare Systems

    Sponsored by: Certified Security Solutions (CSS)

    Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.

  • See How the Miami Marlins Protects Sensitive Scouting and Operation Documents

    Sponsored by: Citrix

    Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.

  • AMD MxGPU Is the World's First Hardware Virtualized GPU

    Sponsored by: AMD

    Discover how you can bring the power and features of a physical GPU to VDI and learn how you can get powerful 3D rendering and secure, consistent performance across all your apps.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • What to Look for in a Security Partner

    Sponsored by: Arbor Networks

    Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.

  • DDoS Mitigation Case Study - The Extra Mile

    Sponsored by: Arbor Networks

    Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.

  • The Importance of DDoS Mitigation

    Sponsored by: Arbor Networks

    In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.

  • Azure Security and Identity Management Best Practices

    Sponsored by: Rackspace

    Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.

  • What If an Invisible Attacker Tried to Bring Down Your Business?

    Sponsored by: Lenovo

    In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.

  • Facing up to Mobile Security Challenges

    Sponsored by: IBM MaaS360

    Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.

  • Customer Identity Use Cases: Building a Complete, Contextual Digital Experience

    Sponsored by: Radiant Logic, Inc.

    See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.

  • Enabling Secure, Customized Identity Management

    Sponsored by: Radiant Logic, Inc.

    Discover how to deliver smarter security and more customized services to your customers. Listen in to see how a common identity service for all constituents can improve security and deliver better services to your customers, while saving time and money in administration.

  • Simplify Cloud Access and Provisioning with a Federated Identity Service

    Sponsored by: Radiant Logic, Inc.

    Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.

  • Join the Citrix Ready Secure Remote Access Program

    Sponsored by: Citrix Ready

    What is Citrix Ready Secure Remote Access Program? How does it help you showcase your products and solutions while highlighting the integration with Citrix products? This video explains this program, why you should join, and how you and your customers will benefit its implementation.

  • Podcast: How Sunrise Health Region is Improving the Clinician Experience through Secure and Simple VDI

    Sponsored by: Dell, Microsoft and Citrix

    Tune in to this podcast to learn how Sunrise Health Region overcame long log-in times and multiple sign-in credentials from each endpoint they used daily with a VDI approach to help both users and IT.

  • Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics

    Sponsored by: SearchSecurity.com

    This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 3

    Sponsored by: Intel

    This webcast informs you on the critical need for security intel sharing and how best to accomplish your sharing goals. Enable your organization to mitigate threats proactively while allowing other organizations to do the same.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.