ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Management Multimedia

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Webinar: 20 Critical Controls for Cyber Defense

    Sponsored by: ISACA

    Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity.

  • Tips for Expediting Incident Response

    Sponsored by: Threat Track Security

    This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?

    Sponsored by: Symantec Corporation

    Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.

  • Webcast: Symantec Internet Security Threat Report 2014

    Sponsored by: Symantec Corporation

    Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.

  • Maximum-Strength Threat Detection for Mid-Size Enterprises

    Sponsored by: EMC Corporation

    This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.

  • Hidden Lynx – Professional Hackers for Hire

    Sponsored by: Symantec Corporation

    This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Reducing Your Patch Cycle to Less Than 5 Days

    Sponsored by: Tenable

    This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • Expect More From Your SIEM

    Sponsored by: AT&T Cybersecurity

    Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.

  • Security University: Data Loss Prevention

    Sponsored by: TechTarget Security

    The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • The Custom Defense - Your Answer to APTs

    Sponsored by: Trend Micro

    Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Lumension Endpoint Management and Security Suite

    Sponsored by: Lumension

    A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

    Sponsored by: Wave Systems Corp.

    Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.