Information Security Research Library

Powered by Bitpipe.com

Multimedia

  • How to Consolidate Identities for Office 365 and Cloud Access

    Sponsored by: Radiant Logic, Inc.  | Premiered: Apr 18, 2014

    This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.

  • Third Party Applications: A Chink in Your Armour

    Sponsored by: Lumension  | Premiered: Apr 15, 2014

    This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.

  • Endpoint Security Compliance: Top 19 Questions Auditors Ask

    Sponsored by: Lumension  | Premiered: Apr 11, 2014

    This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.

  • How-to Build High Performance Security for the Software-Defined Data Center

    Sponsored by: Trend Micro  | Premiered: Apr 11, 2014

    Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.

  • How-to Build High Performance Security for the Software-Defined Data Center

    Sponsored by: Trend Micro  | Premiered: Apr 9, 2014

    This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments.

  • Mobile Application Security Chaos

    Sponsored by: Hewlett-Packard Company  | Premiered: Apr 8, 2014

    Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.

  • Navigating Security in a Mobile World

    Sponsored by: Cisco Systems, Inc.  | Premiered: Apr 3, 2014

    This interactive webpage will help you navigate security threats in a mobile world, as well as outlines potential security breaches and what you can do to stop them.

  • Chalk Talk: NetIQ Cloud Access

    Sponsored by: NetIQ  | Premiered: Apr 2, 2014

    This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.

  • Enterprise Strategy Group Improving Incident Response with NetCitadel

    Sponsored by: NetCitadel  | Premiered: Apr 2, 2014

    In this video, Enterprise Strategy Group's Jon Oltsik looks at the weakness of detection-focused security strategies doomed to failure. Responding to threats is what really keeps firms out of the headlines, and organizations need to prepare properly.

  • What Security Pros Need to Know About Cloud

    Sponsored by: CloudPassage  | Premiered: Apr 1, 2014

    In this webcast, uncover the benefits of policy-based automation for your security systems – to help you keep a scalable cloud environment protected.

About the Webcast, Video and Podcast Library

The SearchSecurity Multimedia Directory is your guide to informative Security technology Multimedia provided by a wide range of IT vendors. Browse and search through the Multimedia Directory to access the complete webcast collection and hear informative presentations on hot Security-related topics including Email Security, Identity Management and Security Management. Interested in hearing from IT industry experts focused on Security technologies? If so, browse this Directory for TechTarget Expert Multimedia, which provide exclusive editorial content on relevant and emerging topics.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.