ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Multimedia

  • Endpoint Backup & Restore: Protect Everyone, Everywhere

    Sponsored by: Code42

    Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • Keep Endpoint Data Safe

    Sponsored by: Code42

    This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.

  • PC Data Migration Made Easy with Endpoint Backup

    Sponsored by: Code42

    PC data migration projects are challenging, but endpoint backup can make the process easier. This webcast will give expert advice on how to make the migration process as simple as possible.

  • CentraStage Endpoint Management

    Sponsored by: CentraStage

    This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints

  • 2014 Ultimate Buyers Guide to Endpoint Security Solutions

    Sponsored by: Lumension

    This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.

  • Application Whitelisting Best Practices: Lessons from the Field

    Sponsored by: Lumension

    This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Security University: Data Loss Prevention

    Sponsored by: SearchSecurity.com

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Mobile Device Management Live Chat

    Sponsored by: SearchSecurity.com

    In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.

  • Cloud Security, Options and Trends

    Sponsored by: CenterBeam

    Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.

  • Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices

    Sponsored by: SpectorSoft

    Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Endpoint Protection Small Business Edition

    Sponsored by: Symantec Corporation

    Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.

  • Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date

    Sponsored by: Webroot

    Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

  • Mobile Application Security from HP - Build security into your mobile applications

    Sponsored by: Hewlett-Packard Enterprise

    Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.

  • MicroScope Seminar: How to Succeed in Managed Services

    Sponsored by: Kaseya International Limited

    Access this essential resource to discover the top reasons why managed service providers (MSPs) should embrace end-point management and learn how to achieve breakthrough success in the IT managed services business

  • ESET Online Scanner

    Sponsored by: ESET

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • Optimizing Intelligent Clients for Desktop Virtualization

    Sponsored by: Intel

    There are many options available for desktop virtualization today. In this expert video, learn about the intelligent client approach to desktop virtualization.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • IPv6: The Next IP Standard

    Sponsored by: AT&T Corp

    With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.