Data Security Multimedia
-
Ransomware Threat Spotlight
Sponsored by: BarracudaAnother unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
-
IT Priorities 2018 - What's happening in security?
Sponsored by: TechTarget ComputerWeekly.comIn this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
-
What the new EU data protection rules mean for IT marketers
Sponsored by: TechTarget ComputerWeekly.comThe new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.
-
SQL Safe Backup: Automate Backups Safely, and Faster
Sponsored by: IderaEliminate application downtime, automate SQL Server backup, and speed up processes. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
Endpoint Backup & Restore: Protect Everyone, Everywhere
Sponsored by: Code42Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
-
Big Data Begins with Better Backup
Sponsored by: Symantec CorporationThis video gives insight into one vendor that specializes in maintaining existing infrastructures while complimenting it with Hadoop. This allows customers to bring in new technology without having to worry about lapses in data protection.
-
Hardening Hadoop for the Enterprise
Sponsored by: WANdiscoPrepare for Hadoop implementation with this knowledgeable webcast.
-
Take Control of Critical Information for Your Employees' Sake
Sponsored by: ClearswiftThis webcast offers key tips on how to reduce insider threat and keep data protected from loss or exposure.
-
BYOD Happens: How to Secure Mobility
Sponsored by: CitrixView this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
How to Save 100s of Backup Maintenance Hours
Sponsored by: Veeam SoftwareThis webinar highlights the difficulties of maintaining outdaed backup approaches. It also highlights the benefits of Veeam Backup and Replication, a solution that provides flexible, reliable and fast recovery of virtualized applications and data.
-
Select the right VMware, Hyper-V protection for a modern data center
Sponsored by: Veeam SoftwareThis webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
-
Webinar: Protecting Critical SaaS Data Before It’s Too Late
Sponsored by: Spanning Cloud AppsThis webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
EMC Video Surveillance Storage Solution
Sponsored by: EMC & ArrowWatch this concise webcast to uncover the key features of an industry-leading storage solution which has been specifically designed to support your video surveillance systems.
-
HIPAA Compliance Statement
Sponsored by: TigerText, Inc.This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
-
Unique Capabilities for Protecting Data in Enterprise Hospital Environments
Sponsored by: BridgeHead SoftwareThis white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
-
Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
Sponsored by: Code42In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
-
Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
Sponsored by: FujitsuThis exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
-
Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
Sponsored by: Iron MountainThis news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
-
IBM Intelligent Investigation Manager
Sponsored by: IBMView this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
-
Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
Sponsored by: IBM.Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
-
Integration and Governance - Why it's Important for Big Data
Sponsored by: IBMAs the volume and variety of data increases, it becomes harder to ensure trustworthiness, and placing confidence in this information becomes risker. In order to effectively leverage analytics to glean actionable insights from big data, you need to be able to trust that information -- in other words, it must be properly integrated and governed.