ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Multimedia

  • Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation

    Sponsored by: Intel

    This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.

  • BreakingPoint: Denial of Service and Network Security Testing

    Sponsored by: Ixia - Keysight

    This webcast demonstrates how to set up and run various security tests with BreakingPoint, as well as how to analyze the results of those tests. Find out how you can increase your understanding of your network and its defenses against threats like denial of service (DoS) attacks.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Survival Guide: Securing Networks without Borders Show

    Sponsored by: Cisco Systems, Inc.

    In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them

  • Meet Digital Enterprise Demands with the Latest Edge Security

    Sponsored by: Fortinet, Inc.

    Learn about 3 digital transformation trends that are reshaping network security, and find out how you can adapt with advanced threat protection via a next-gen firewall appliance.

  • Cloud-Based Cybersecurity for Industrial IoT Apps

    Sponsored by: Bayshore Networks

    In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.

  • Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?

    Sponsored by: Symantec Corporation

    Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.

  • Safeguard Data Across the Board Through Smarter Authorization Enablement

    Sponsored by: HID Global

    Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • Mobile Device Management Live Chat

    Sponsored by: SearchSecurity.com

    In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.

  • Trusted Computing: Establishing Device Authentication

    Sponsored by: Wave Systems Corp.

    View this video to learn the secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard.

  • Beyond Device Recognition

    Sponsored by: iovation, Inc.

    Find out how to strike the balance between cybersecurity and user accessibility for devices on-the-go with advanced device intelligence that uses device behavior, content, and reputation to stop fraud in its tracks.

  • Navigating Security in a Mobile World

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.

  • Lumension Sanctuary Device Control

    Sponsored by: Lumension

    Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.

  • Managing Security on Shared Resources

    Sponsored by: WinMagic

    Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.

  • How to Prevent Security Breaches Through Effective Management and Control of USB Devices

    Sponsored by: Lumension

    Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.

  • Understanding Secure Work Space for iOS and Android Devices

    Sponsored by: BlackBerry

    This exclusive webcast examines how you can establish and maintain a secure workspace for mobile platforms such as Android and iOS.

  • Mobilizing Lotus Domino

    Sponsored by: Sybase iAnywhere

    Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.

  • Podcast: Security across your enterprise mobile devices: What you need to know

    Sponsored by: BlackBerry

    This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.

  • Empower Employees with the Digital Workspace

    Sponsored by: Data#3

    Watch this brief video to learn about a digital workspace that allows IT to securely deliver any app from any cloud to any device.

  • Transform IT with a Unified Workspace Management Platform

    Sponsored by: Data#3

    Watch this webcast to discover how a unified workspace platform can help your organization securely manage a variety of endpoints from any device, app or location and empower end users with a flexible self-service functionality.

  • The power of the Citrix mobility solution, XenMobile

    Sponsored by: Citrix

    This informative webcast examines a mobile device management (MDM) solution from industry giant Citrix that can secure and manage the devices within your enterprise environment easily and effectively. Tune in now to see a demo of this tool and see first-hand how simple and helpful it really is.

  • Leveraging Office 365 with VMware AirWatch®

    Sponsored by: vmware airwatch

    As enterprises embrace adoption of Microsoft Office 365,  achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how an enterprise mobility management tool easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data security.

  • Why AirWatch EMM is the Future of Mac Management

    Sponsored by: vmware airwatch

    Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.

  • 2014 Ultimate Buyers Guide to Endpoint Security Solutions

    Sponsored by: Lumension

    This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.

  • Introducing BlackBerry Balance™ Technology

    Sponsored by: BlackBerry

    Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.

  • The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security

    Sponsored by: Colligo Networks Inc.

    In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise.

  • The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security

    Sponsored by: Colligo Networks Inc.

    In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise.

  • Troubleshooting Enterprise Activation Issues

    Sponsored by: BlackBerry

    This webcast will cover the following topics: Enterprise activation overview, Prerequisites for enterprise activation, Troubleshooting stage 1 issues: activation, Troubleshooting stage 2 issues: verifying encryption etc.

  • Secure and Always-On Connectivity Changes the Game

    Sponsored by: Aruba Networks

    From optimizing campus network switches and access points to paving the way for IoT, hear from Aruba networking experts on a variety of topics, including leading wired and wireless pain points, IoT security challenges, and more.

  • Craft the Right Strategy for Your Enterprise With HPE Mobility Solutions

    Sponsored by: Hewlett Packard Enterprise

    HP Enterprise Mobility Services can help you build mobile applications that enable you to convert customer interactions into revenue opportunities. Click on the link below to learn more and one of our mobility experts will be in touch shortly to discuss a face to face demo. To reach out to HP directly, please email us at enterprisesolutions@hp.com

  • The Token is Dead. Long Live the Token

    Sponsored by: SafeNet, Inc.

    View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost

  • BYOD Happens: How to Secure Mobility

    Sponsored by: Citrix

    View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.