ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Multimedia

  • Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?

    Sponsored by: Symantec Corporation

    Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.

  • About APCON – Intelligent Network Monitoring Solutions

    Sponsored by: APCON, Inc.

    This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.

  • Web Security – Virtual Appliance

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

  • Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.

  • Reducing Your Patch Cycle to Less Than 5 Days

    Sponsored by: Tenable

    This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.

  • Reducing Security Complexity

    Sponsored by: Optus Business

    In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • Simplify Network Monitoring with Ixia Anue NTO

    Sponsored by: Ixia

    Are you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices

    Sponsored by: SpectorSoft

    Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!

  • Data Centre to Cloud

    Sponsored by: Juniper Networks, Inc.

    Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • The Custom Defense - Your Answer to APTs

    Sponsored by: Trend Micro

    Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • Cisco Prime Network Control System 1.1

    Sponsored by: Cisco Systems, Inc.

    This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.

  • Evolution to the Cloud

    Sponsored by: Ciena

    Learn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • Cisco CleanAir Technology

    Sponsored by: Cisco Systems, Inc.

    Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.

  • Cisco Connected World Technology Report

    Sponsored by: Cisco Systems, Inc.

    Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.

  • Mobile Application Security from HP - Build security into your mobile applications

    Sponsored by: Hewlett-Packard Enterprise

    Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.