ComputerWeekly.com Research Library

Powered by Bitpipe.com

Anti-Spyware Software Research

  • Analyzing Consumer IT Security Bad Habits that are Coming into the Office

    Sponsored by: WinMagic

    This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.

  • Shore Up Your Office365 Attack Surface

    Sponsored by: SearchSecurity.com

    This exclusive e-guide reviews the Microsoft Office 365 suite including the security benefits and challenges you will encounter.

  • SQL Injection: How to Sidestep the Oldest Hacking Trick in the Books

    Sponsored by: EE

    In this white paper, gain insight into the basics of SQL injection attacks and why hackers haven't retired it yet. Continue reading to learn what steps to take to close easily exploitable vulnerabilities in your security strategy.

  • As Enterprise Mobility Usage Escalates, So Does Security Risk

    Sponsored by: HID

    In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.

  • Top 10 Firewall Shopping Checklist

    Sponsored by: Juniper Networks, Inc.

    In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.

  • What to Do When Anti-Virus Isn't Enough

    Sponsored by: Malwarebytes Corporation

    Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.

  • Building a Layered Defense Against Data Breaches

    Sponsored by: Absolute Software

    This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.

  • Keeping Applications Safe with Whitelisting

    Sponsored by: Digital Guardian

    This e-guide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.

  • Advancing Cyber-security Measures from the Inside

    Sponsored by: VMware

    This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.

  • The Paradigm Shift in Cybersecurity

    Sponsored by: UnitedLex

    This white paper explores why hackers have the upper hand and why organizations need to ramp up security measures regardless of their current status.

  • SSL Accerleration Checklist

    Sponsored by: Blue Coat Systems

    This white paper explores the challenges of SSL management and offers steps to remedy them. Read on to explore the critical requirements checklist for an SSL acceleration platform.

  • Next-Gen Security Analytics - 7 Necessary Functions

    Sponsored by: Blue Coat Systems

    This white paper examines security analytics in depth and the seven functions a security analytics platform needs to have.

  • Markets and Bounties for Cybercrime Tools and Stolen Data

    Sponsored by: Juniper Networks, Inc.

    This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.

  • 5 Steps to Designing a Next-Gen Firewall

    Sponsored by: Juniper Networks, Inc.

    This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.

  • Insight into Hacker Economics

    Sponsored by: Juniper Networks, Inc.

    This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

  • Endpoint Protection Platforms for Enterprises

    Sponsored by: Symantec Corporation

    This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • A Buyer's Guide to Endpoint Protection Platforms

    Sponsored by: McAfee, Inc.

    This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data

    Sponsored by: Imperva

    In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

  • McAfee Tackles the Complexities of Endpoint Security

    Sponsored by: McAfee, Inc.

    This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  • The New Reality of Stealth Crimeware

    Sponsored by: McAfee, Inc.

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  • McAfee Endpoint Protection Suite

    Sponsored by: McAfee, Inc.

    This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.

  • The Evolving Landscape of Desktop Security

    Sponsored by: McAfee, Inc.

    This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.