ComputerWeekly.com Research Library

Powered by Bitpipe.com

Endpoint Security Multimedia

  • What is Tehama?

    Sponsored by: Tehama

    Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.

  • Comprehensive Lifecycle Management

    Sponsored by: Insight

    The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Best Practices for Physical Server and Endpoint Backup

    Sponsored by: Veeam Software

    In this webcast, Veeam Senior Director of Product Strategy Rick Vanover shares best practices for physical server and endpoint backup, as well as showcases how the Veeam Agents for Windows and Linux can help organizations keep physical data available.

  • Red Cloak Threat Detection & Responses

    Sponsored by: Dell SecureWorks

    Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.

  • Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology

    Sponsored by: Fidelis

    Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • Endpoint Backup & Restore: Protect Everyone, Everywhere

    Sponsored by: Code42

    Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • Keep Endpoint Data Safe

    Sponsored by: Code42

    This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.

  • PC Data Migration Made Easy with Endpoint Backup

    Sponsored by: Code42

    PC data migration projects are challenging, but endpoint backup can make the process easier. This webcast will give expert advice on how to make the migration process as simple as possible.

  • CentraStage Endpoint Management

    Sponsored by: CentraStage

    This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints

  • 2014 Ultimate Buyers Guide to Endpoint Security Solutions

    Sponsored by: Lumension

    This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.

  • Application Whitelisting Best Practices: Lessons from the Field

    Sponsored by: Lumension

    This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.

  • Q&A: Protecting and Enabling the Anytime, Anywhere Worker

    Sponsored by: Commvault

    Watch this informative webcast to find out what Rachel Dines recommends for protection management.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • Security University: Data Loss Prevention

    Sponsored by: SearchSecurity.com

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Mobile Device Management Live Chat

    Sponsored by: SearchSecurity.com

    In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.

  • Cloud Security, Options and Trends

    Sponsored by: CenterBeam

    Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.

  • Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices

    Sponsored by: SpectorSoft

    Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • Endpoint Protection Small Business Edition

    Sponsored by: Symantec Corporation

    Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.

  • Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date

    Sponsored by: Webroot

    Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.