ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Services Multimedia

  • Understanding Private IP/MPLS-based Networks

    Sponsored by: Fluke Networks

    Watch this webcast to learn the key drivers and benefits of private IP, common pitfalls to avoid, and best practices for deploying and managing a private IP deployment.

  • EMC and Microsoft Delivering Network Aware Service Management

    Sponsored by: Microsoft

    Are you in need of a solution that provides end-to-end management across your entire infrastructure? Find out how EMC and Microsoft have teamed up to create a solution that addresses these issues.

  • Network-Aware End-to-End Service Management - Demo

    Sponsored by: Microsoft

    This is a demo of an end to end service management solution that spans the entire infrastructure.

  • CTO Data Playbook - With Stacy Mill and Chris McKean

    Sponsored by: NetApp

    Disaster preparedness, fast recovery and immutable data services are three of the biggest trends Stacy Mill, VP and CISO at Nashville Electric Service, is seeing in the cybersecurity landscape. Learn more about how to prepare your organization in 2025 with this English language CTO Data Playbook webinar.

  • Making the Better Choice for Adopting Data Security as a Service - Top 10 Decision Points for Choosing the Right Vendor

    Sponsored by: Utimaco

    This webcast takes a deep dive into Data Security as a Service, including the basics of this strategy, the top 10 decision points for choosing the right vendor, and more.

  • Discover General Purpose Hardware Security Modules as a Service

    Sponsored by: Utimaco

    This webinar examines general purpose hardware security modules as a service, and provides key insights for ensuring success when adopting a data protection as a service strategy.

  • Bank on It: Test Automation for Financial Services Success

    Sponsored by: SmartBear Software

    Financial services face challenges balancing stability, security, and compliance with modernization. This webinar shows how test automation tools enhance testing with AI-driven features like self-healing tests, data generation, and OCR. Learn how automation drives success in financial services applications.

  • What is Third-Party Maintenance (TPM)?

    Sponsored by: Service Express

    Tune into this In a Flash video to learn the basics of third-party maintenance, and discover how you can start assembling a strong third-party toolset to support your data center maintenance strategy.

  • SpecOps Secure Service Desk Overview

    Sponsored by: SpecOps and Outpost24

    Specops Secure Service Desk prevents social engineering attacks by enforcing secure user verification. By requiring multiple MFA factors before password resets or account unlocks, it protects against attacks like the MGM Resorts breach. Watch this video to learn how to safeguard your service desk from cybercriminals.

  • Tech Lock-In: What Causes It, and How to Break Out

    Sponsored by: Corsica Technologies

    Customers often feel "locked in" with their managed service provider due to long-term leases and data center ties. Providers can offer flexibility by retaining customers through service value, not lock-in. In this webcast, learn to assess your technology strategy and avoid mistakes when moving to the cloud.

  • Unlock improved ROI With Full Visibility From Ad Click to Patient Visit

    Sponsored by: Freshpaint

    Freshpaint’s Ad Performance beta introduces powerful, privacy-first features designed to elevate your marketing performance. Watch this on-demand webinar to explore how these features can redefine your strategy and help you make smarter, privacy-first decisions with insights into CAC and ROI across service lines.

  • Helping Healthcare Organizations Be Resilient to Disasters & Ransomware

    Sponsored by: AWS Healthcare

    Disasters, whether human-made or natural are unavoidable, so planning for them is critical to ensuring delivery of care and services, regardless of the situation. Most organizations are more aware of and planning for high-profile data breaches and ransomware but many are not prepared for the most common types of disasters and human errors.

  • Securing cloud infrastructure with Confidential Computing Webinar

    Sponsored by: Google Cloud & AMD

    In this webcast, you’ll learn about the confidential computing model: a new security paradigm that uses hardware-based memory encryption to keep cloud data and code protected when being processed. Tune in now to find out how you can prevent instances of unauthorized access and safeguard your sensitive data in the cloud.

  • Contrast Security

    Sponsored by: Contrast Security

    Financial services organizations are ripe targets for bad actors, with a plethora of wealth and personal data. Island hopping has become a popular method to access this treasure trove, targeting the information of stakeholders like customers and partners. Learn how you can protect against this new tactic in this webinar from Contrast Security.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Financial services face rising cyber threats like island hopping and exploited vulnerabilities. Learn how to safeguard applications with insights from Contrast Security and AWS experts in this informative video.

  • The Cost of Forgotten Passwords

    Sponsored by: SpecOps and Outpost24

    In this webinar, you will discover the significant costs associated with password resets and learn how much organizations can save by implementing a self-service password reset solution. Don't miss out on the chance to gain expert insights and improve your organization's password security protocols.

  • Identity Security Trailblazer: Automating Identity Security in Finance with Erste Digital

    Sponsored by: CyberArk

    Join this webcast to hear from CyberArk’s David Higgins and Erste Group’s Christian Bilek as they share insights on integrating modern solutions with legacy systems, overcoming growth challenges, and the crucial role of automation in identity security. Learn actionable strategies to secure and streamline your financial services operations.

  • Business Value and Impact of SASE Adoption with Netskope & Wipro

    Sponsored by: Netskope

    In the dynamic landscape of cybersecurity and networking, the transition from legacy systems to Secure Access Service Edge (SASE) architecture presents a transformative opportunity. Learn how SASE reduces maintenance and connectivity costs and understand how SASE enhances remote and hybrid work experiences.

  • The value of Runtime Security for the financial sector: Why current Application Security approaches too often fall flat

    Sponsored by: Contrast Security

    Watch this webinar to break down the state of application security and threat landscape for financial services companies, alongside experts from Contrast Security and AWS. Don’t risk missing best practices for improving app security and the benefits of implementing runtime security covered.

  • Digital-First Strategies

    Sponsored by: Fabric Health

    The nation is facing a critical provider shortage—83% of counties are experiencing a primary care provider shortage, according to the Health Resources & Services Administration. This webinar explores today’s healthcare challenges and how a digital-first approach can expand access, create capacity and reduce provider burnout.

  • A Day in the Life of a Ransomware Attack

    Sponsored by: Comcast Business

    This webcast explores the timeline of a ransomware attack and best practices you can use to minimize its impact, including insights to strengthen your security posture. Tune in now to find out how you can better protect your business against evolving cyber threats.

  • Multicloud and Your WAN

    Sponsored by: Apcela

    Today’s organizations are in need of greater speed and flexibility. Namely, they’re looking for ways to integrate their core data centers, regional offices and remote users with SaaS and IaaS providers, and to extend their traditional WAN to the cloud. Watch this webcast to learn how Apcela’s Arcus Platform may be able to assist.

  • Threat Hunters - Episode 1

    Sponsored by: Logicalis

    Threat hunting teams use proactive monitoring and analysis to detect and respond to cyberattacks faster, reducing the time to identify and contain breaches. This webcast explores how threat hunters uncover threats, handle real-life incidents, and save organizations millions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.