ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET Multimedia

  • Keystones For Creating A Successful Gen AI Adoption Plan

    Sponsored by: Deloitte

    During this video, industry experts will discuss the importance of developing an effective data strategy prior to implementing an AI adoption initiative. Tune in now to discover the requirements your business needs to meet in order to take full advantage of the benefits gen AI has to offer.

  • Intermedia Unite and Contact Center - A Quick Overview

    Sponsored by: Intermedia.Net

    Today, many organizations are looking for new ways that they can improve their customer experience (CX) and strengthen their contact center employee collaboration. However, with so many solutions on the market, it can be difficult to know which one best fits your company’s needs. Tune into this video to learn more.

  • ecuring Data and AI in Today

    Sponsored by: Palo Alto Networks

    Organizations are wasting no time in shifting budget resources to generative AI (GenAI). Such a rapid buy-in on GenAI prompts security teams to ponder: Are standard data security practices enough? Watch this on-demand webinar to discover how to protect data in the age of generative AI and multicloud.

  • Connecting Public Sector Data Analysis with PS2G and SAS Webinar

    Sponsored by: SAS and PS2G

    Recent research shows that data compatibility is a bigger issue than ever before for the public sector, with only 35% of organizations saying data is compatible across some applications. Discover how the SAS and PS2G partnership can help you streamline data collection and integration, achieving a unified view that drives strategic improvements.

  • Accelerating BI Mirgration to SaaS

    Sponsored by: Qlik

    In this webinar, uncover a strategy to accelerate BI migration to SaaS, including application rationalization, migration automation, and ongoing platform management. Learn how to leverage Qlik Application Automation to streamline your BI modernization journey. Access the full webinar for more.

  • Is your safety certification at risk?

    Sponsored by: Wind River

    This webinar examines the factors that influence a certifiable solution program schedule and details what you can do to mitigate common risks to achieve an on-time and on-budget development effort.

  • SHI Video

    Sponsored by: SHI

    What was once an eternal debate has instead united the workplace, as more and more organizations are deciding to integrate both Microsoft and Mac platforms. Join tech experts as they discuss insights on unified endpoint management, the app gap, productivity and security apps, and the importance of change management in adoption.

  • NCC Group Video

    Sponsored by: NCC Group

    As the deadline for the Digital Operational Resilience Act (DORA) approaches, the importance of regulatory readiness has never been more critical for financial institutions and technology providers alike. Tune into this webcast now to unlock best practices for achieving compliance and future proofing your business.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Financial services face rising cyber threats like island hopping and exploited vulnerabilities. Learn how to safeguard applications with insights from Contrast Security and AWS experts in this informative video.

  • AWS-Splunk Video

    Sponsored by: AWS-Splunk

    Unfortunately, almost a third of IT and security managers can’t keep their security data online due to cost or operational shortcomings. Join Amazon Security Lake GM Mark Terenzoni and Splunk Product Management Director Colin Gibbens as they discuss how their two organizations partner to create an accessible, modern security strategy.

  • T-Mobile for Business Webinar

    Sponsored by: T-Mobile for Business

    In this brief video, learn why small and medium businesses are recognizing reliable connectivity as foundational to business success today – and discover how you can conquer connectivity challenges with 5G and wireless broadband technology.

  • Critical Condition How Qilin Ransomware Endangers Healthcare

    Sponsored by: CyberArk

    In this eye-opening presentation, experts raise the alert of Qilin, a sophisticated Ransomware as a Service operator specifically targeting the U.S. healthcare sector. Discover how threat actors evade EDR detection, exploit MFA vulnerabilities, and execute devastating attacks on medical institutions.

  • NCC Group Video

    Sponsored by: NCC Group

    Software reaching end-of-support feels like a ticking time bomb: inevitably, vulnerabilities will be discovered, and threat actors will strike. And with heavy reliance on software, whether on-premises or on cloud, many organizations require an additional measure of protection. Discover the value of software escrow with Escode in this video.

  • How Agentforce drives employee productivity at Salesforce

    Sponsored by: Salesforce and Deloitte Digital

    During this webcast, you’ll discover why Salesforce partnered with Deloitte Digital to deploy Agentforce Service Agent on Employee Success’ Service Cloud platform for HR case management. Tune in now to find out how you can transform the employee service experience and enable productivity and capacity gains for both agents and employees.

  • The Role of GenAI in ELevating Contact Center as a Service

    Sponsored by: Salesforce and Deloitte Digital

    During this webcast, you’ll find out how you can leverage GenAI strategies to take your contact center operations to the next level. Tune in now to learn how you can assess your contact center’s AI readiness and chart a course for more efficient service delivery.

  • Top 5 To Do's to Create Complete Security for Your Cloud Environment

    Sponsored by: Utimaco

    Despite the myriad benefits it offers, the cloud comes with immense risk. In fact, bad actors see your cloud environment as an opportunity. This webinar counts down 5 essential points for achieving comprehensive security across your entire cloud environment.

  • Thriving in tomorrow's healthcare: a roadmap for value-based success in 2025

    Sponsored by: Navina

    Watch Navina and AMGA’s webinar for a roadmap to value-based care success in 2025. Discover strategies, technologies, and best practices to improve outcomes and reduce burnout.

  • PQC from Theory to Practice

    Sponsored by: Utimaco

    Emerging quantum threats to classic cryptography are introducing significant business risk and setting the stage for potentially dire consequences. This webcast examines the importance of post quantum cryptography in mitigating the quantum threat.

  • Enhancing Visibility of HSM Keys across the Digital Ecosystem

    Sponsored by: Utimaco

    Utimaco, a leading provider of Hardware Security Modules (HSMs), has partnered with Infosec Global in order to enhance the visibility of HSM keys across the digital ecosystem. This webinar provides insights into this strategic partnership and the value it offers for your business.

  • Transforming Security: Innovative Cyber Solutions for Digital Transformation in 2024

    Sponsored by: Utimaco

    This webinar examines the evolving digital landscape and the critical role played by cybersecurity. Inside, learn about key technologies driving digital change, common digital transformation hurdles, practical steps to digitize business processes securely, and more.

  • Discover General Purpose Hardware Security Modules as a Service

    Sponsored by: Utimaco

    This webinar examines general purpose hardware security modules as a service, and provides key insights for ensuring success when adopting a data protection as a service strategy.

  • Fortifying Against Quantum Threats - Proven Defense Mechanisms

    Sponsored by: Utimaco

    Quantum computers have the potential to significantly enhance efficiency and problem-solving capabilities; however, in the wrong hands, they also pose a substantial threat to the security of present-day cryptography. This webinar shines a light on the world of quantum threats and offers proven defense mechanisms.

  • How to Improve Your Cloud Resilience

    Sponsored by: AWS Opti9

    In under 30 minutes, learn how to boost your cloud resilience and protect critical applications by tuning into this webcast, which features insights from Principal Solutions Architect at AWS, Diego Dalmolin, and Cloud Alliances Director at Opti9, Drew Jenkins.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Watch this webinar to break down the state of application security and threat landscape for financial services companies, alongside experts from Contrast Security and AWS. Don’t risk missing best practices for improving app security and the benefits of implementing runtime security covered.

  • Making the Better Choice for Adopting Data Security as a Service - Top 10 Decision Points for Choosing the Right Vendor

    Sponsored by: Utimaco

    This webcast takes a deep dive into Data Security as a Service, including the basics of this strategy, the top 10 decision points for choosing the right vendor, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.