ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Multimedia

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • A Mandate to Execute a New Data Security Strategy

    Sponsored by: Ionic Security

    In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.

  • Addressing Enterprise Security Challenges

    Sponsored by: Rackspace

    In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Azure Essentials: Defense in depth security

    Sponsored by: TechData - Microsoft

    As cloud becomes more widely adopted, security across these expanding cloud environments needs to improve to keep pace with modern threats and operational requirements. Watch this video to learn more about Microsoft Azure’s cloud security, management and control capabilities, including how it leverages machine learning.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • BICS Demonstration Webinar

    Sponsored by: Beta Systems

    Managing disparate, multi-vendor IT infrastructure components is no easy feat. Inside this demonstration video, take a closer look at Beta Systems’ Business Infrastructure Control Solution and find out how it can optimize your ITOM practices.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Cloud Insiders - Risk and Compliance in the Hybrid Cloud

    Sponsored by: Xtravirt

    A hybrid cloud carries a heavy risk profile that extends throughout its infrastructure. Staying updated, implementing new features & monitoring security threats are critical processes. Not to mention the constant changes in regulations to look out for. Watch this webcast to learn more about risk & compliance in hybrid clouds.

  • Cloud Native Security

    Sponsored by: Rackspace

    The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Connect, Enable and Protect Your Workforce

    Sponsored by: IBM

    Although the massive shift towards remote work seemed like a temporary protocol at first, this new way of working looks to be the norm for the foreseeable future. Luckily, securing a remote workforce doesn’t require a massive restructure. Watch this webinar to see how IBM is helping organizations embrace the new normal.

  • Continuous Risk Monitoring for Vulnerabilities

    Sponsored by: ServiceNow

    In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.

  • Creating Digital Trust: Anchoring Remote Users to Real Identities

    Sponsored by: Onfido

    As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.

  • A Brazilian company adopts IBM System z to handle rapid business growth

    Sponsored by: IBM

    This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX

    Sponsored by: Vision Solutions

    This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Balancing Risk with Agility: Best Practices for Securing Cloud Deployments

    Sponsored by: Trend Micro

    Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

  • CA ARCserve Backup r12.5 SRM Features

    Sponsored by: arcserve

    CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.