ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Multimedia

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management

    Sponsored by: IBM

    This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.

  • IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4

    Sponsored by: Symantec Corporation

    With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  • IBM Application Security Solutions Demo

    Sponsored by: IBM

    IBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.

  • Endpoint Security and Control

    Sponsored by: Sophos

    Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

  • Cisco Secure Remote Access Solution

    Sponsored by: Cisco Systems, Inc.

    This demo shows how the Cisco Secure Remote Access Solution provides simple access from virtually anywhere while protecting endpoint systems data and internal resources.

  • Key Steps to Securing Your Organization and Evicting a Hacker

    Sponsored by: Foundstone, Inc.

    This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.

  • Intel vPro Technology Launch Video

    Sponsored by: Intel Corporation

    Business Desktop PCs with Intel vPro technology provide down-the-wire proactive security and manageability capabilities for your every business needs'-even when the user's environment is inoperable.

  • Sophos Email Security Appliances

    Sponsored by: Sophos

    The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.