ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Audits Multimedia

  • Data Security: Best Practices for Remote Workers

    Sponsored by: TITUS

    How do you tackle the issues associated with securing remote workers (such as easily compromised home Wi-Fi networks)? Tune into this webcast to hear experts walk you through best practices for securing your remote workforce and endpoints in today’s distributed enterprises.

  • Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs

    Sponsored by: Dell SecureWorks

    The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.

  • End-to-End Security Solutions for Mid-Market Businesses

    Sponsored by: Dell Technologies and Intel

    Tune into this webinar to learn directly from industry experts, analysts and product champions on how to transform your business with Dell Technologies’ portfolio of security products and solutions.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Understanding and Preventing Finance Phishing Fraud

    Sponsored by: Barracuda

    Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.

  • Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions

    Sponsored by: Symantec Corporation

    View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Safe & Secure: An Overview of Security Features In JBoss Application Platforms

    Sponsored by: Red Hat

    Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.

  • CORE IMPACT Pro V10

    Sponsored by: Core Security Technologies

    Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Optiview Network Analyzer -- Free Hardware Trial

    Sponsored by: Fluke Networks

    IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • Webroot Enterprise Spy Audit

    Sponsored by: Webroot

    Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.