ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Multimedia

  • Cybersecurity Law and Latest Security Compliance Trends in China

    Sponsored by: Alibaba Cloud

    The world’s approach to data privacy has evolved quickly over time. Nations have developed their own standards and regulations on the matter. GDPR is the most newsworthy example of cybersecurity law, but countries around the world are looking into their data use laws. View this webcast for a look at compliance trends in China.

  • Shor's Algorithm

    Sponsored by: Thales

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • Replacing FTP Scripts with Managed File Transfer

    Sponsored by: Help/Systems

    Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Dell Data Protection

    Sponsored by: DellEMC and Intel®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • Cloud Security: Built from the Ground Up

    Sponsored by: Intel

    Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.