ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Multimedia

  • KPN focuses on Information Security with HP

    Sponsored by: Hewlett-Packard Enterprise

    View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Podcast: The challenges of managing mobile devices across a corporate IT environment

    Sponsored by: BlackBerry

    This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.

  • Webcast: The Newest Information Management Innovation from IBM

    Sponsored by: IBM

    This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.

  • Webcast: IBM Information Management in the New Era of Computing

    Sponsored by: IBM

    Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.

  • Modern Retention Enablement

    Sponsored by: IBM

    This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • Security University: Data Loss Prevention

    Sponsored by: SearchSecurity.com

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Bring Your Own Security to the Cloud

    Sponsored by: CenterBeam

    Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Anatomy of a Database Attack

    Sponsored by: Imperva

    Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • The Critical Security Controls – Moving Beyond the Checklist Mentality

    Sponsored by: Lumension

    The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Ensure Data Protection with Sun StorageTek T10000B Tape Drives

    Sponsored by: Sun StorageTek

    Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.

  • Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management

    Sponsored by: Juniper Networks, Inc.

    Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

  • 2008 Verizon Business Data Breach Investigations Report

    Sponsored by: Verizon Business

    Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Service Management with AppManager

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

  • What's New in Group Policy Administrator 5.0

    Sponsored by: SUSE

    Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.

  • NetIQ Security Solutions for iSeries Trial

    Sponsored by: SUSE

    NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.

  • VigilEnt Policy Center 4.2 Trial

    Sponsored by: SUSE

    VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.

  • Directory and Resource Administrator 7.5 Trial

    Sponsored by: SUSE

    NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.

  • Ensuring VoIP Quality of Service

    Sponsored by: SUSE

    Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.