ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Systems Multimedia

  • Zero Trust Access

    Sponsored by: PortSys

    Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.

  • Application Shielding First Line of Defense for Financial Apps

    Sponsored by: Intertrust

    In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.

  • Protecting from Bot Attacks with PerimeterX

    Sponsored by: PerimeterX

    In this customer success story, Build.com shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks. Watch the video to learn more.

  • Evolve your Security Operations Center

    Sponsored by: Optiv

    Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.

  • Guide to Eliminating the Top 3 Security Pain Points

    Sponsored by: Menlo Security

    In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • The Top Industries at Risk for Cyber Attacks

    Sponsored by: Barracuda

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Understanding and Preventing Finance Phishing Fraud

    Sponsored by: Barracuda

    Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.

  • Your App Security Stack: How to Defend Against the Evolving Threat

    Sponsored by: Arxan

    In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.

  • Trust But Verify: Mobile App Protection Best Practices

    Sponsored by: Arxan

    This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.

  • The Values of Both Building Your Own SOC and Buying SOC-as-a-Service

    Sponsored by: Arctic Wolf

    SOCs are the latest services you can now outsource rather than build in-house. The question is whether a DIY SOC or a SOC-as-a-Service is a better fit for your company. In this webcast, learn the value propositions of both SOC-as-a-Service and DIY SOC. The speakers also discuss key factors to help you decide which option is best for you.

  • Solving the Financial Services Security Talent Shortage with Managed Detection

    Sponsored by: Arctic Wolf

    This webcast explores how banks and other financial institutions can protect their critical assets with managed detection and response. Find out how you can overcome the security skills shortage with threat detection services.

  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service

    Sponsored by: Arctic Wolf

    This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).

  • How a Security Expert Defends Your Network's Blind Spots

    Sponsored by: Arctic Wolf

    Find out why having a security expert on your IT team makes a measurable difference in your network's defense and learn about Arctic Wolf's security operations center as a service (SOCaaS).

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • Security Operations Center: Build on the Native Security Features of AWS and Office 365

    Sponsored by: Arctic Wolf

    This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.

  • Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

    Sponsored by: WhiteHat Security

    Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.

  • Get Real Time Threat Detection Starting on Day 1 with AlienVault USM

    Sponsored by: AT&T Cybersecurity

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA Conference

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Webinar: 20 Critical Controls for Cyber Defense

    Sponsored by: ISACA

    Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.