ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile Device Management Multimedia

  • How Okta’s IT + Workplace Teams Are Getting Ready for Dynamic Work

    Sponsored by: Okta

    While the trends and practices within workplace optimization have varied over the last few decades, the main objective has remained the same: Optimize the productivity of people and processes. Watch this webinar and listen to 2 distinguished Okta leaders as they discuss the future of workplace optimization.

  • From 30% to 100% Remote: How to Lead the Rapid Shift to a Remote Workforce

    Sponsored by: Okta

    Connecting and communicating is critical for maintaining a semblance of normality, especially during times of crisis. Achieving this in the era of COVID-19, which saw the remote workforce jump from 30% to 100%, has been particularly challenging. Watch this webinar to see how IT and workplace technology experts at Okta handled this transition.

  • Synack CISO Podcast Series: Action in Unprecedented Times

    Sponsored by: Synack

    In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.

  • Industry and Financial Regulations: The Implications for Application Security

    Sponsored by: Veracode, Inc.

    Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • WEBINAR: Protecting Against Coronavirus Email Fraud

    Sponsored by: Armorblox

    Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.

  • Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce

    Sponsored by: Automox

    Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • Neptune Software Announces New Blood Donor Matching App for Bloodmates

    Sponsored by: Neptune Software

    Sifting through data can be a huge time sink. Free-form data entry exacerbates this problem. For Bloodmates, searching through data was not only time-consuming – it was life or death. Neptune Software stepped in to help Bloodmates create a mobile app that restructured the organization’s information retrieval process. Learn more in this video.

  • Mobile Applications: How to Stay Ahead of the Game

    Sponsored by: Hewlett Packard Enterprise

    This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.

  • Forrester on Addressing IT Challenges in Today's Mobile World

    Sponsored by: Commvault

    In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.

  • How a unified workspace solution is built for hybrid environments

    Sponsored by: NComputing

    Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.

  • Show Me Simpana--Protect Your Data with Simpana 10

    Sponsored by: Commvault

    Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.

  • Emerging Trends Radar Screen

    Sponsored by: Gartner

    Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.

  • Dell Latitude Rugged Extreme Laptops

    Sponsored by: DellEMC and Intel®

    This exclusive webcast examines a rugged laptop built to withstand the rough conditions that workers in the field face.

  • Mind the Gap! Embracing Enterprise Mobility Management

    Sponsored by: Code42

    This whitepaper exploress specific mobile challenges, such as implementation of MDM and MAM for thousands of users, and shares his real-world perspective.

  • Extreme - IndentiFi

    Sponsored by: Extreme Networks

    This exclusive webcast discusses wireless networking solution that allows your organization to provide your users with the wireless performance needed to seamlessly access critical applications and data, even if the workloads are media-intensive.

  • Craft the Right Strategy for Your Enterprise With HPE Mobility Solutions

    Sponsored by: Hewlett Packard Enterprise

    HP Enterprise Mobility Services can help you build mobile applications that enable you to convert customer interactions into revenue opportunities. Click on the link below to learn more and one of our mobility experts will be in touch shortly to discuss a face to face demo. To reach out to HP directly, please email us at enterprisesolutions@hp.com

  • Plan Your Enterprise Mobility Strategy

    Sponsored by: Intel

    This exclusive resource discusses how you can build a successful enterprise mobility environment for your businesses, examining best practices, helpful use cases, and suggestions for which tools can help drive innovation and cut costs.

  • BYOD Happens: How to Secure Mobility

    Sponsored by: Citrix

    View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.

  • Move Beyond Point Solutions to Complete EMM

    Sponsored by: Citrix

    This informative webcast discusses the problems associated with point solutions and examines how and why your organization should move past these tools to a complete enterprise mobility management (EMM) solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.