ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Architectures Multimedia

  • Keep Endpoint Data Safe

    Sponsored by: Code42

    This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.

  • Dell Data Protection

    Sponsored by: DellEMC and IntelĀ®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • Mobile Security: Containerizing Enterprise Data

    Sponsored by: Code42

    Straight from the IT battleground, gain expert insight on how to effectively and immediately containerize your enterprise data. Learn the importance of mobile security within these applications and what you can do immediately to ensure that your enterprise data is as efficient and actionable as possible.

  • Video: Amazon Web Services API Security Overview

    Sponsored by: Intel

    Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • Windows Azure Platform Security Essentials for Technical Decision Makers

    Sponsored by: Microsoft

    In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform.

  • Virtualization Podcasts: Infrastructure Solutions for Midsized Companies

    Sponsored by: IBM

    Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.

  • 5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk

    Sponsored by: Lumeta Corporation

    Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.