ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • An MSP Guide to Selling IT Security

    Sponsored by: LogicNow

    Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.

  • Cloud IAM - TCO

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. By adding enterprise-grade identity-as-a-service (IDaaS), you'll be able to reduce costs by 60%, onboard SaaS apps 100 times faster and generate powerful access management from a single screen.

  • Securing BYOD without MDM

    Sponsored by: BitGlass

    Witness how enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. Listen in on the discussion about the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • Webcast: Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    Whether you are trying to stop data breaches, demonstrate compliance or gain control of your data, an effective DLP strategy relies heavily on how successful your deployment is.We've collected tips and techniques to ease common pain points, including successful customer migration use cases to Intel Security DLP.

  • Detecting and Stopping Sophisticated Cyber Attacks In the Small and Medium-Size Enterprise

    Sponsored by: Arctic Wolf Networks, Inc.

    In this webcast, op security experts discuss the latest online attacks being leveled at the small and mid-sized business, as well as current trends in malware affecting SMBs. It'll outline an array of options for enterprises that must handle today's emerging threats while maintaining a shoestring security budget.

  • Don't be the next Yahoo

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast breaks down the Yahoo data breach and explains what small and medium-sized businesses should take away from this situation.

  • Incident Response

    Sponsored by: Arctic Wolf Networks, Inc.

    This webcast looks at the steps you should take to respond to a security incident and to develop your own incident response plan.

  • Solving the DLP Puzzle: Learnings for a Successful Deployment

    Sponsored by: Intel Security

    What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.

  • 5 Keys to Boosting Cloud Security Confidence

    Sponsored by: BitGlass

    Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.

  • Balancing User Productivity and Security

    Sponsored by: RES Software

    Uncover a secure access system your workforce can use to ensure the safety of enterprise data. At the same time, you can ensure that workers aren't hampered by your security systems and can get their work done.

  • Demo: A Look Inside a Security Intelligence Platform

    Sponsored by: IBM

    In this video, you'll learn how to consolidate data from thousands of devices, endpoints and applications distributed throughout your network. You'll hear about how a security intelligence platform can replace dozens of point products helping you collect more information and make quicker decisions about threats in your network.

  • Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard

    Sponsored by: IBM

    This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Threat Summary: Top 2016 Cyber Risks

    Sponsored by: Proofpoint, Inc.

    Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.

  • vSEC for VMware NSX Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Learn the importance of IT security to a successful international insurance group with a wide range of services, Helvetia. See how software-defined data center strategy with VMware NSX.

  • How SAIC Empowers Its Security Operations Center with Splunk

    Sponsored by: Splunk

    In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.

  • 6 Ways to Put 'Secure" Back in Secure Web Gateways

    Sponsored by: Trustwave

    Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.

  • Best Practices to Securing the Cloud and SDDC

    Sponsored by: Check Point Software Technologies Ltd.

    Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

  • The New Generation of Network Security

    Sponsored by: Juniper Networks, Inc.

    Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.

  • Preventing PDF Exploits with Endpoint Security

    Sponsored by: TrendMicro

    See how endpoint security can fail when it comes to detecting malicious documents, particularly PDFs. Uncover a side-by-side comparison of endpoint security vendors as they attempt to deal with malicious documents.

  • Modern Cybercrime: Staying Ahead of The Perfect Storm

    Sponsored by: Trustwave

    Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.