ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Multimedia

  • SD-WAN with Enterprise Scale and Security in Action

    Sponsored by: Forcepoint

    Find out how you can manage your network and boost connectivity no matter how spread out your enterprise is with a scalable SD-WAN platform, combined with the industry's top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.

  • Corelight Webcast: New SIEM on the Block -- Meet Humio

    Sponsored by: Corelight

    Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.

  • The Values of Both Building Your Own SOC and Buying SOC-as-a-Service

    Sponsored by: Arctic Wolf

    SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.

  • Get Real Time Threat Detection Starting on Day 1 with AlienVault USM

    Sponsored by: AT&T Cybersecurity

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions

    Sponsored by: IBM.

    Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Symantec Endpoint Protection Small Business Edition 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • Self-Management of Passwords (SMOP) Version 1.1

    Sponsored by: turbo-IT Corporation

    Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs.

  • RSA Solution for Cloud Security and Compliance

    Sponsored by: RSA

    This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.

  • Windows Azure Platform Security Essentials: Module 1 - Security Architecture

    Sponsored by: Microsoft

    In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4

    Sponsored by: Symantec Corporation

    With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.