ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Detection Systems Multimedia

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Unified Security Management: Real-time Threat Detection

    Sponsored by: AT&T Cybersecurity

    This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • Deep Security 7.5

    Sponsored by: Trend Micro, Inc.

    Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.