ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research

  • Exposing the Unknown: How Sandboxing Technology Fights Modern Threats

    Sponsored by: Kingpin Communications

    This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.

  • Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection

    Sponsored by: Veeam Software

    This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.

  • Threat Research: Targeted Attacks on Enterprise Mobile

    Sponsored by: Kingpin Communications

    This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.

  • The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks

    Sponsored by: Kingpin Communications

    In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.

  • How Mobile Malware Compromises Your Secure Containers and Enterprise Content

    Sponsored by: Kingpin Communications

    Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.

  • Evolving Toward the Next Phase of Email

    Sponsored by: IBM

    In this Osterman Research report, learn how email is evolving and combining with new technologies. Explore how you can ensure that your email is securely integrated with new capabilities such as mobile and social, so that you can leverage email as a competitive advantage rather than allow it to become a liability.

  • Top 6 Cyber Security Threats to iOS Devices

    Sponsored by: Kingpin Communications

    This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.

  • Checkpoint: Demystifying Mobile Security Attacks

    Sponsored by: Kingpin Communications

    In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause. Access this paper to arm yourself and identify how to best detect Android malware applications and rootkits, man-in-the-middle attacks, and more.

  • Zero Trust on the Endpoint

    Sponsored by: Palo Alto Networks

    This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.

  • Journey to the Data Lake: A Modern Data Architecture with Apache Hadoop

    Sponsored by: Hortonworks

    In this paper, you will examines the functionalities of Apache Hadoop as a data platform, and discover how to integrate Hadoop into your modern data center architecture, alongside the data warehouse. Learn how to deliver an enterprise data lake by reading on, and augment existing insight with multi-workload data processing.

About the ComputerWeekly.com Research Library

The Information Technology Research Library provides enterprise IT professionals in the UK with the latest information on IT technology, including options for enterprise software and hardware, tools and resources for all aspects of IT management, networking and communications and more, with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.