ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Infrastructure Multimedia

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Secure

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Ransomware Threat Spotlight

    Sponsored by: Barracuda

    Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.

  • Protecting Business and Remote Workers from Covid-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • CASE STUDY: Tricentis slams the door on C-level email attacks using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Keep Endpoint Data Safe

    Sponsored by: Code42

    This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.

  • Dell Data Protection

    Sponsored by: DellEMC and Intel®

    This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.

  • IBM Intelligent Investigation Manager

    Sponsored by: IBM

    View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.

  • Understanding Secure Work Space for iOS and Android Devices

    Sponsored by: BlackBerry

    This exclusive webcast examines how you can establish and maintain a secure workspace for mobile platforms such as Android and iOS.

  • Exposing the Beast - Custom API Mgt for the Enterprise

    Sponsored by: Intel Corporation

    In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.

  • Podcast: Security across your enterprise mobile devices: What you need to know

    Sponsored by: BlackBerry

    This exclusive podcast discusses the current state of mobile security, examining the major issues seen today in the mobile working environment and what your organisations can do to overcome them.

  • Enhancing End-to-End Cloud Security: Part 3

    Sponsored by: Intel Security

    This brief video explores the security options to secure cloud data centers, devices, data and more and then explains the future developments that will make the cloud even more secure. View now to enhance end-to-end cloud security.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security

    Sponsored by: Colligo Networks Inc.

    In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise.

  • Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud

    Sponsored by: Intel

    Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more.

  • Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins

    Sponsored by: Intel

    This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment.

  • Videocast: Considerations for Choosing Cloud Backup Hosting Services

    Sponsored by: KineticD

    Cloud backup for physical and virtual environments is becoming more and more important for SMBs. Gartner predicts that by 2012, Vendor Lock-in will surpass security as the biggest obstacle to cloud computing. Vendors are trying to lock-in and maintain their customers forever, not allowing them the flexibility and mobility SMBs require.

  • Keep Your Enemies Closer - Get Proactive about Security

    Sponsored by: AT&T Corp

    Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.

  • Video - Vulnerability Management in a Web 2.0 World

    Sponsored by: Lumension

    Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.