ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Multimedia

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • Why Should I Care About SSL/TLS Decryption?

    Sponsored by: Gigamon

    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Dell Data Protection

    Sponsored by: DellEMC and Intel®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • Cloud Security: Built from the Ground Up

    Sponsored by: Intel

    Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.