ComputerWeekly.com Research Library

Powered by Bitpipe.com

RACF Multimedia

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • 7 Key Steps to Developing an Audit-Ready Security Program

    Sponsored by: Ostendio

    In this webinar, join the President and CEO of Ostendio as he provides a comprehensive overview of the 7 steps to developing an audit-ready security program, including key considerations for ensuring organization-wide buy-in. Watch now to get started.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Artificial Intelligence in Cybersecurity

    Sponsored by: Spin Tech

    Given the nature of artificial intelligence, it’s no surprise to see organizations integrating AI capabilities into their cybersecurity strategies. This webinar provides a comprehensive overview of AI and its role in cybersecurity, offering expertise for evaluating AI-based cybersecurity tools and vendors.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • BlackBerry AI Powered Zero Trust

    Sponsored by: BlackBerry

    Endpoint security affects all aspects of an organization, not least when workforces are remote.To this end, Zero Trust can be a double-edged sword for leaders in industry. Namely, they want to stock up on security without sacrificing user experience. How can this be done in a mature manner?This webcast presents models that organizations can use.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Conquering the Authentication Challenge of Zero Trust

    Sponsored by: Micro Focus

    According to Forrester, passwords, along with similar traditional authentication methods, will soon be a thing of the past to be succeeded by biometrics in the zero-trust authentication architecture. Watch this video to go in-depth into advanced authentication methods, best practices and potential architectural blueprints.

  • Data Protection at Home and in the Cloud

    Sponsored by: ProAct

    Current events have forced more employees than ever before to work from home, and many employers are struggling to protect their data as they adjust to this new way of doing things. Watch this video to learn how you can safeguard your employees and your company’s data infrastructure as you adapt to the realities of working through COVID-19.

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • 3 CIO Essentials: Top Trends To Help Your Business

    Sponsored by: MuleSoft

    This one-stop-shop for CIOs discusses the 3 most important trends companies can capitalize on to help future success. Access this webinar now for an in-depth look into essential topics.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • 7 Habits of Highly Effective Teams

    Sponsored by: IBM

    Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.

  • Adobe Flash Builder 4

    Sponsored by: Adobe

    Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Are you Agile Enough?

    Sponsored by: IBM

    If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]

  • Beyond the Scrum Team: Delivering "Done" at Scale

    Sponsored by: Tasktop

    Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.

  • Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions

    Sponsored by: IBM.

    Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Docmosis V2.0

    Sponsored by: Docmosis

    Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool.

  • Download Unitrends Enterprise Backup, Free for 30 days

    Sponsored by: Unitrends

    This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.

Browse by Report Type: RACF White Papers | RACF Multimedia | RACF IT Downloads

See more topics related to: RACF

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.