Research Library

Powered by


  • Unify Mobile and Desktop Management

    Sponsored by: Citrix  | Premieres: Nov 9, 2018

    In this quick 3-minute video, learn how to protect your network security endpoints and prevent data leakage through Citrix Workspace and Windows Information Protection (WIP).

  • IoT and the New Security Challenge

    Sponsored by: Juniper Networks  | Premiered: Feb 19, 2018

    According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.

  • Reducing Cybersecurity Costs & Risk through Automation Technologies

    Sponsored by: Juniper Networks  | Premiered: Feb 16, 2018

    According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.

  • Protecting Your Sensitive Data

    Sponsored by: Symantec  | Premiered: Feb 14, 2018

    Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.

  • DevOps Short Movie

    Sponsored by: Estafet Ltd  | Premiered: Feb 13, 2018

    The goal of any DevOps adoption is the efficient delivery of business value. Watch this clip to learn how you can use value stream analysis and pain point mapping so you can target your teams' efforts where they have the most impact.

  • Complying with Data Protection Law in a Changing World

    Sponsored by: Forcepoint  | Premiered: Feb 12, 2018, 01:04 EST (06:04 GMT)

    Watch this webcast to learn some of the best strategies for answering compliance questionnaires, and some common compliance themes that span many regulations. Then, take a deep-dive into article 5 of the GDPR, and learn how you can improve your data breach monitoring and identification procedure.

  • Employee & Device Monitoring: Dispelling the Myths

    Sponsored by: Forcepoint  | Premiered: Feb 12, 2018, 01:00 EST (06:00 GMT)

    Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.

  • Forcepoint CASB: Visibility and Control of Cloud Applications

    Sponsored by: Forcepoint  | Premiered: Feb 12, 2018

    Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.

  • Protect Against Zero Day Threats and Malware

    Sponsored by: Citrix  | Premiered: Feb 12, 2018

    Watch this brief video to learn how this browser-as-a-service can help you defend against malware that gets in through unsecured web browsing.

  • How to Maintain Control of Documents and Files Shared with Others

    Sponsored by: Citrix  | Premiered: Feb 12, 2018

    Tune into this video for a walkthrough of ShareFile, in which you'll learn how to set restrictions, on the file-level for secure sharing and collaboration. Scott Lane, Distinguished Citrix Engineer, demonstrates the platform's file-level authentication and authorization capabilities, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.