ComputerWeekly.com Research Library

Powered by Bitpipe.com

Smart Cards Multimedia

  • 3 Steps to Secure Remote Workers and Students

    Sponsored by: Cisco Umbrella

    As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.

  • A Mandate to Execute a New Data Security Strategy

    Sponsored by: Ionic Security

    In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.

  • A Transformative Approach to Addressing Today’s Cybersecurity Threat Landscape

    Sponsored by: Lumen

    Given the severity of today’s cyberthreats and the penalties for regulatory noncompliance, business outcomes are heavily influenced (if not fully dictated) by an organization’s cybersecurity well-being. Watch this webinar to learn how to align cybersecurity with business objectives and address today’s threats.

  • Accelerating Automation and Driving Value

    Sponsored by: ServiceNow

    IT automation promises reduced manual efforts, but its impact can be hard to truly visualize on paper. Tune into this webinar to hear from a real-world organization who successfully implemented IT automation for their users.

  • Addressing Enterprise Security Challenges

    Sponsored by: Rackspace

    In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Lightboard: Total Email Protection

    Sponsored by: Barracuda

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Beta Systems IAM: Protection From The Inside Perpetrator

    Sponsored by: Beta Systems

    It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • BICS Demonstration Webinar

    Sponsored by: Beta Systems

    Managing disparate, multi-vendor IT infrastructure components is no easy feat. Inside this demonstration video, take a closer look at Beta Systems’ Business Infrastructure Control Solution and find out how it can optimize your ITOM practices.

  • Carbon Black WM

    Sponsored by: VMware International Unlimited Company

    Research suggests that the 2020 pandemic has been the catalyst for some of the worst cyberattacks on organizations in recent memory. In this video, join Bryan Glick (Computer Weekly) and Greg Foss (VMware Carbon Black) as they discuss the evolving challenges of cybersecurity, why they're happening and what your organization can do about it.

  • Changing the Rules of Ransomware

    Sponsored by: Dell SecureWorks

    Ransomware has become a series threat to an organization’s data – and there is conflicting advice on whether an organization should pay the ransom or not. This webinar provides a closer look at the evolution of ransomware attacks, which regions and industries are most affected, why an organization should or shouldn’t pay, and more.

  • CipherTrust Data Discovery and Classification from Thales

    Sponsored by: Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • Cloud Native Application Security: Have You Covered All Your Bases?

    Sponsored by: Rackspace

    The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Sponsored by: Barracuda

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Continuous Risk Monitoring for Vulnerabilities

    Sponsored by: ServiceNow

    In this demo, take a closer look at ServiceNow’s continuous risk monitoring platform and discover how it can help your organization meet its GRC standards by identifying the risks of unpatched vulnerabilities and resolving them quickly. Continue to watch the complete presentation.

  • Creating Digital Trust: Anchoring Remote Users to Real Identities

    Sponsored by: Onfido

    As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.

  • A Brazilian company adopts IBM System z to handle rapid business growth

    Sponsored by: IBM

    This on-demand video case study explains how Sicoob, Brazil's largest cooperative credit system, achieved high performance and scalability by investing in the right server platform, allowing the company to accommodate business growth.

  • A free Demonstration of Panda Cloud Systems Management

    Sponsored by: Panda Security

    Watch this demo for a cloud-based remote monitoring and management solution that can help you gain full visibility and proactively detect problems within your IT environment to improve overall operational efficiency.

  • Achieving Rapid Data Recovery for IBM AIX Environments: An Executive Overview of EchoStream for AIX

    Sponsored by: Vision Solutions

    This podcast looks closely at a unique data recovery solution for IBM AIX Environments called EchoStream for AIX.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Balancing Risk with Agility: Best Practices for Securing Cloud Deployments

    Sponsored by: Trend Micro

    Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.

  • CA ARCserve Backup r12.5 SRM Features

    Sponsored by: arcserve

    CA ARCserve Backup r12.5 uses a three-tier architecture within a domain. Check out this demonstration for an explanation of the CA ARCserve Backup r12.5 SRM Features, including architecture, dashboard overview, nodes and tiers, and SRM probe.

Browse by Report Type: Smart Cards White Papers | Smart Cards Multimedia | Smart Cards IT Downloads

See more topics related to: Smart Cards

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.