ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Multimedia

  • Cloud Foundation 4, Networking & Security Built In

    Sponsored by: VMware

    One of the key components that VMware have invested in with VMware Cloud Foundation to help drive simplification, consistency and developer experience is built-in networking and security at every layer of the stack. In this webcast, hear from VMware experts as they discuss the networking and security benefits of Cloud Foundation 4.0.

  • How Next-Gen Networking Technologies Improve Security

    Sponsored by: Verizon

    69% of organizations claim that their network management team finds it challenging to balance availability and security. Additionally, data security improvement is reported to be most important among network strategists. This webcast may help you to stay ahead of the curve. Topics include security awareness, business continuity, and SD-WAN.

  • Securing the New Normal: A Virtual Happy Hour on Moving Forward

    Sponsored by: RSA Conference

    In this webcast, a panel of industry leaders discuss the future of cybersecurity, highlighting what’s next for the industry, and the ways in which cybersecurity will evolve as we come to understand the “new normal” – focusing on business processes, procedures and policies, network security architecture and much more.

  • BlackBerry AI-Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote. To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner? This webcast presents models that organizations can use.

  • Summer School Gone Virtual? How to Keep Virtual Activities Safe for Students

    Sponsored by: Cisco Umbrella

    Schools are under constant threat from a variety of attacks, and with students now learning from home, hackers are finding it easier to break in. Without the right network security, your school district could be at risk.Watch this informative webcast about Cisco Umbrella, cloud-delivered network security that keeps your school safe.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Securing a Remote Workforce

    Sponsored by: ProAct

    As people connect to their work VPNs via their home networks, there are more holes in security and greater vulnerability to attack. According to Barracuda Networks, email phishing went up 600% in the month of March. Watch this webinar for an in-depth look at cyberthreats – and what you can do to fight back.

  • Enabling Distributed Workforce

    Sponsored by: TATA Communications

    As enterprises provision for mass remote work, they are faced with a new range of connectivity, security and collaboration challenges. In this webcast, learn how Tata Communications can help organizations address these challenges.

  • Election System Security Starts at the Network

    Sponsored by: CradlePoint

    There’s a spotlight on cybersecurity that is pushing local, county, and state officials to update and fortify elections systems. Download this webcast to learn how election system security starts at the network.

  • 7 Key Steps to Developing an Audit-Ready Security Program

    Sponsored by: Ostendio

    In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.

  • Connecting and Securing the Wireless Edge in Branch Networks

    Sponsored by: CradlePoint

    Branches are undergoing dramatic change. Organizations engage with their customers in new places, such as pop-up branches at large events, temporary seasonal storefronts, and branches inside large box stores. These trends and more have ushered in new requirements for branch networking. Watch this short video to learn more.

  • Time to try IBN

    Sponsored by: Cisco

    In this short video, learn how intent-based networking with Cisco DNA can help automate your network, keep business secure, prevent downtime and keeps users, devices and apps connected securely.

  • Cloud-Scale Engineering

    Sponsored by: VMware International Unlimited Company

    In this webcast, learn how VMware and Intel’s co-engineering efforts can help enterprises solve business problems around disaster recovery, security, application development and more.

  • Connecting Technologies that Protect First Responders and Communities

    Sponsored by: CradlePoint

    In this video, learn how Cradlepoint can help provide the secure connectivity that first responders including police, fire, and EMS agencies need to leverage critical technologies and access up-to-date information 24x7.

  • SD-WAN Collaboration Demonstration Annotated

    Sponsored by: Oracle Communications

    In this SD-WAN collaboration demonstration, 4 key features are being shown, including: how to access and maintain a multi-cloud scenario, the security you have within the SD-WAN, and 2 more. Download this video to learn more about these features.

  • Best Practices for CIOs to Ensure Business Continuity During This Pandemic

    Sponsored by: Cloudflare

    During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • Why You Need Managed SD-WAN

    Sponsored by: Hughes Network Systems

    There are many business drivers for an SD-WAN implementation, but the core reasons include security, bandwidth optimization, network reliability and cloud access. Watch this short video to learn more about these core business drivers and see how HughesON can deliver on them.

  • NetOps 2.0: Application Intelligence

    Sponsored by: Gigamon

    Overnight millions are suddenly working from home, putting IT teams under tremendous pressure to maintain security and performance in spite of an increased load. But there are effective ways to respond. In this webinar, review these new challenges and learn how NetOps 2.0 gives you the agility to adapt and win.

  • Global Transit Network Architecture with Azure Virtual WAN

    Sponsored by: Barracuda

    When deployed together, Azure virtual WAN and the Barracuda cloud-gen firewall have the potential to provide powerful and advanced distributed networking with efficient, high-speed cloud connectivity and strength in security. Download this short video to learn more.

  • Zero-Trust in Practice

    Sponsored by: Gigamon

    In reality, a Zero Trust architecture goes beyond “trust no one” and “build micro-perimeters around your data”, and requires organizations define their own framework, policies and practices. As a result, no two Zero Trust implementations are alike. Download this webcast to learn more.

  • Deploying SD-WAN Environment with Barracuda

    Sponsored by: Barracuda

    In this short video, walk through the steps to deploying an SD-WAN with Barracuda’s cloud generation firewalls.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • User Experience at the Edge: Performance Monitoring and Assurance for the Network Edge

    Sponsored by: Accedian

    5G networks are coming, and with them will come massive changes to the number and type of devices connected to the network. This influx of connections means that performance management and security will become increasingly important and complex. In this video, learn how Skylight can help you manage the performance of these new network edge devices.

  • Avoiding Top 3 Security Challenges of Digital Transformation

    Sponsored by: Menlo Security

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.