ComputerWeekly.com Research Library

Powered by Bitpipe.com

Public Key Encryption Software Multimedia

  • 4 Actions to Secure Work from Home Employees

    Sponsored by: Ping Identity Corporation

    Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.

  • Alero Demo

    Sponsored by: CyberArk Software, Inc

    As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.

  • Alero Intro

    Sponsored by: CyberArk Software, Inc

    In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.

  • Alero Showcase

    Sponsored by: CyberArk Software, Inc

    In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Defend Against Cyber Threats

    Sponsored by: TechData - Microsoft

    Today’s cyberattacks are growing in both volume and complexity, and existing defense methods are only able to detect known threat vectors. To keep pace with modern threats, organizations need a proactive approach to cybersecurity. Watch this video to learn more about Microsoft’s approach to detecting and mitigating threats.

  • DevSecOps Reference Architecture Test Drive Webinar

    Sponsored by: Sonatype

    What happens when an organization integrates the team, technique, and toolsets of a Security team with a DevOps team, where trust is a major component? Access this webinar, to hear the creator of DevSecOps as he talks with 3 industry experts across several organizations, sharing their battle-hardened stories about creating safer software sooner.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • 3 CIO Essentials: Top Trends To Help Your Business

    Sponsored by: MuleSoft

    This one-stop-shop for CIOs discusses the 3 most important trends companies can capitalize on to help future success. Access this webinar now for an in-depth look into essential topics.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • 7 Habits of Highly Effective Teams

    Sponsored by: IBM

    Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.

  • Adobe Flash Builder 4

    Sponsored by: Adobe Inc

    Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Are you Agile Enough?

    Sponsored by: IBM

    If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]

  • Beyond the Scrum Team: Delivering "Done" at Scale

    Sponsored by: Tasktop

    Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.

  • Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions

    Sponsored by: IBM.

    Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.

  • byREQUEST®: Automatically Sweeps Files into Sharepoint

    Sponsored by: Hillary Software

    From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.

  • CA ARCserve Backup r12.5 Security Features

    Sponsored by: arcserve

    Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Docmosis V2.0

    Sponsored by: Docmosis

    Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.

  • Download Unitrends Enterprise Backup, Free for 30 days

    Sponsored by: Unitrends

    This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.

  • Efficient SAN Based Tape Encryption with Curtis Preston

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.