ComputerWeekly.com Research Library

Powered by Bitpipe.com

Information Security Multimedia

  • Forrester CMD Webinar - Challenges in the Security Landscape

    Sponsored by: Cisco Umbrella

    Access this Forrester webinar to learn some of the biggest challenges faced by security pros at organizations of all sizes and what they’re doing to overcome security risk. And discover Cisco Cloud Mailbox Defense, a new email security product engineered with the aim to help security pros address email threats and overcome these challenges.

  • Integrated Risk Management on ServiceNow

    Sponsored by: ServiceNow

    The more rules there are, the easier it is to fall foul of them, even if you don’t mean to. And as your business grows, there are always going to be new risks to think about. Identify, manage and minimize your exposure to risk. Watch this 8-minute video to discover Deloitte’s Integrated Risk Management, powered by ServiceNow.

  • SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long

    Sponsored by: Interos

    The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.

  • SITAD 101 - Proper Disposal of Retired IT Assets

    Sponsored by: Iron Mountain

    Due to sensitive data, the process of IT asset disposition (ITAD) is much more complex than simply throwing away equipment. However, it can hard to know where to start. Download this webcast for a how-to guide for getting started with ITAD, including ITAD 1010 and what to look for in a new partner.

  • KPN focuses on Information Security with HP

    Sponsored by: Hewlett-Packard Enterprise

    View this brief webcast to gain insight on an information security solution one organization chose to defend against today's highly motivated hackers, and how they're benefiting.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Podcast: The challenges of managing mobile devices across a corporate IT environment

    Sponsored by: BlackBerry

    This informative podcast discusses the common mobile device management challenges that IT faces and what your organization can do to alleviate them.

  • Webcast: The Newest Information Management Innovation from IBM

    Sponsored by: IBM

    This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.

  • Webcast: IBM Information Management in the New Era of Computing

    Sponsored by: IBM

    Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.

  • Modern Retention Enablement

    Sponsored by: IBM

    This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.

  • IT Reputational Risk Study Overview

    Sponsored by: IBM

    This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.

  • Security University: Data Loss Prevention

    Sponsored by: SearchSecurity.com

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Bring Your Own Security to the Cloud

    Sponsored by: CenterBeam

    Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Anatomy of a Database Attack

    Sponsored by: Imperva

    Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • The Critical Security Controls – Moving Beyond the Checklist Mentality

    Sponsored by: Lumension

    The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Ensure Data Protection with Sun StorageTek T10000B Tape Drives

    Sponsored by: Sun StorageTek

    Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.

  • Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management

    Sponsored by: Juniper Networks, Inc.

    Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

  • 2008 Verizon Business Data Breach Investigations Report

    Sponsored by: Verizon Business

    Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • What's New in Group Policy Administrator 5.0

    Sponsored by: SUSE

    Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.

  • Service Management with AppManager

    Sponsored by: SUSE

    Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.