ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Standard Multimedia

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service

    Sponsored by: Arctic Wolf

    This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

    Sponsored by: WhiteHat Security

    Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • Guide to Eliminating the Top 3 Security Pain Points

    Sponsored by: Menlo Security

    In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.

  • How a Security Expert Defends Your Network's Blind Spots

    Sponsored by: Arctic Wolf

    Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).

  • Security Operations Center: Build on the Native Security Features of AWS and Office 365

    Sponsored by: Arctic Wolf

    This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.

  • Solving the Financial Services Security Talent Shortage with Managed Detection

    Sponsored by: Arctic Wolf

    This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • Cloud Security: Built from the Ground Up

    Sponsored by: Intel

    Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.

  • Dell Data Protection

    Sponsored by: DellEMC and Intel®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Enterprise Security Checklist

    Sponsored by: Code42

    This 6-item checklist provides key recommendations to help boost security against today's cybercrime.

  • IBM Rational Build Forge Demos

    Sponsored by: IBM

    Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • ISACA PCI Compliance Symposium

    Sponsored by: Intel

    As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA Conference

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • PCI 101: A Beginner’s Guide to PCI DSS Compliance

    Sponsored by: FireHost Inc.

    This webcast covers everything you need to know about the payment card industry data security standard.

  • Security University: Cloud Security

    Sponsored by: SearchCloudSecurity.com

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.