ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Multimedia

  • Achieving Compliance and Reducing Risk

    Sponsored by: Comforte AG

    Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.

  • Top 5 Threats to E-commerce Businesses to Address Before the Holiday Season

    Sponsored by: PerimeterX

    With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This video highlights the top 5 threats to e-commerce businesses companies need to be vigilant before this, and any, holiday season. Tune in to learn about these 5 holiday attack trends.

  • Protecting from Bot Attacks with PerimeterX

    Sponsored by: PerimeterX

    In this customer success story, Dan Davis, VP of Technology at Build.com, shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks.

  • APIs, digital transformation and the need for a new approach to security

    Sponsored by: Arxan

    Today, most organizations don’t know how many APIs they’ve deployed, let alone if they’re secure. According to recent threat analyses, API exploits are predicted to be the most frequent attack vector in the next two years. Learn how to protect API access from the outside in with this Arxan webinar now.

  • Banyan Security Zero Trust Remote Access Video

    Sponsored by: Banyan Security

    In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.

  • Is the Cloud Transforming Security?

    Sponsored by: Menlo Security

    As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.

  • Post-Perimeter Security 101: Dawn of a Borderless World

    Sponsored by: Lookout

    With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.

  • FedRAMP ATO on AWS in Half the Time with Automation – A Customer Story

    Sponsored by: AWS - Coalfire

    Hear how automation methodology, pioneered by Coalfire and AWS, enabled Innovest Systems to be FedRAMP assessment ready in less than six months, allowing the company to quickly unlock new government revenue streams. Continue reading to uncover the key takeaways.

  • Video Course: Expedite Your Path to FedRAMP Compliance on AWS

    Sponsored by: AWS - Coalfire

    This 10-minute online course details the significant benefits of SAO techniques and the role of third-party assessment organizations (3PAOs) in building and documenting FedRAMP-compliant environments. Continue on for three self-paced lessons.

  • Claroty Continuous Threat Detection Demo

    Sponsored by: Claroty

    Continuous threat detection (CTD) allows for efficient security with minimal complexity compared to traditional threat detection tools. In this webinar, IT leaders at Claroty discuss the importance of total visibility for data acquisition and provide an in-depth demo of their new dashboard. Continue to watch the demo.

  • Automating Identity & Access Management

    Sponsored by: Hitachi ID

    Identity and access management (IAM) is the process of creating new and modifying existing identities as well as managing the security entitlements associated with those identities. In this webcast, discover an overview of introducing automation to your IAM. Watch now to learn more.

  • 3 Key Capabilities for Next-Generation Identity and Access Management

    Sponsored by: IBM

    Traditionally, identity and access management (IAM) was designed by engineers, for engineers to be customizable and siloed. Next-generation IAM’s goal is to enhance security by improving on these methods. Explore the IAM “as a service” delivery model and uncover it’s 3 key capabilities. Continue to this webinar to learn more.

  • Structuring an IAM program

    Sponsored by: Hitachi ID

    With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.

  • RPA Security Best Practices

    Sponsored by: CyberArk Software, Inc

    Robotic process automation (RPA) enables business to improve productivity, quality & accuracy of data, and compliance. In order to ensure continued RPA benefit, security is critical.In this guide, uncover best practices for securing RPA, the growing risks & how organizations can better protect their software robots.

  • New 2019 Cybercrime Report Tracks Growing Threat of Networked Cybercrime

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions Cybercrime Report provides unique insight into global transaction patterns and emerging cybercrime threats. Join this 50-minute webinar to learn key findings and insights from the 2019 LexisNexis® Risk Solutions Cybercrime Report.

  • Robotic Process Automation Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    Robotic Process Automation (RPA) platforms can provide organizations with great benefits. However, these platforms introduce a new threat vector based on human and non-human identities. In this video, discover 5 security best practices organizations should consider incorporating into their RPA workflows.

  • Defense in Depth: Key Learnings for Achieving Detector and Response

    Sponsored by: Verizon

    Join Gene Stevens and Dave Gold, executive leaders from ProtectWise who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities (video)

    Sponsored by: Fidelis

    In this video, Matt Bromiley, SANS Analyst and Incident Responder, and Gerald Mancini, Senior Vice President of Engineering at Fidelis, discuss elevating enterprise security with Fidelis Cybersecurity in the endpoint security platform. Watch to learn more.

  • Elevating Enterprise Security: Network and Deception Video

    Sponsored by: Fidelis

    Security teams are extremely successful when they can view their organization holistically and in a correlative manner. In this video demo of the Fidelis Elevate platform, learn how it can simplify security teams’ workloads, while improving their ability to detect and hunt for threats.

  • Operationalizing Privacy Policy from Discovery to Enforcement

    Sponsored by: Ionic Security

    Hear from BigID and Ionic Security in this on-demand webinar to learn how you can automate the identification and mitigation of risk to personal data demanded by CCPA and GDPR.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • OnDemnd Webinar: Up, Up and Away! Best Practices for Securing Data in Hybrid Multi-Cloud Environments

    Sponsored by: IBM

    Your data is moving to the cloud – that’s a given – but will it be safe once it gets there? The new reality of a hybrid, multi-cloud world complicates data protection efforts for organizations everywhere, as do new privacy and compliance mandates. In this webinar, learn how to integrate data security into your cloud strategy.

Browse by Report Type: Security White Papers | Security Multimedia | Security IT Downloads

See more topics related to: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.