ComputerWeekly.com Research Library

Powered by Bitpipe.com

Anti-Spyware Software Research

  • Bullet-proofing Office 365 Security

    Sponsored by: ControlEmail

    In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.

  • Why Mobile Security Matters

    Sponsored by: Lookout

    This white paper discusses the five critical questions modern CISO's are asking about mobile security.

  • Mobile is the New Playground for Thieves: How to Protect Against Mobile Malware

    Sponsored by: IBM

    In this white paper, you'll uncover how to move towards a proactive mobile security strategy to detect, analyze, and remediate today's mobile threats.

  • Quick Guide to Network Anomaly Detection

    Sponsored by: Prelert

    This brief white paper details the two types of anomaly scores and how they are manifested. Continue reading now to learn how to use each score as an indicator for proactive alerting.

  • Shore Up Your Office 365 Attack Surface

    Sponsored by: SearchSecurity.com

    This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.

  • SQL Injection: How to Sidestep the Oldest Hacking Trick in the Book

    Sponsored by: EE

    This white paper provides insight into the basics of SQL injection attacks and discusses why it continues to be one of the most common forms of cyber-attack.

  • As Enterprise Mobility Usage Escalates, So Does Security Risk

    Sponsored by: HID

    In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.

  • Preventing Attackers from Getting What They Want

    Sponsored by: SecureAuth

    This white paper explores the danger of a modern attack and discusses why traditional security tools, such as basic authentication, are insufficient.

  • Top 10 Firewall Shopping Checklist

    Sponsored by: Juniper Networks, Inc.

    In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.

  • What to Do When Anti-Virus Isn't Enough

    Sponsored by: Malwarebytes Corporation

    Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.

  • Keeping Applications Safe with Whitelisting

    Sponsored by: Digital Guardian

    This e-guide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.

  • Advancing Cyber-security Measures from the Inside

    Sponsored by: VMware

    This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.

  • Securing Apps from the First Line of Code

    Sponsored by: WhiteHat Security

    This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.

  • 5 Steps to SSL Decryption

    Sponsored by: Gigamon

    This white paper explores an alternative, five step SSL decryption strategy.  View now to learn more

  • How to Defend Websites in the Era of Site Scraping

    Sponsored by: Distil Networks

    This white paper explores the prevalence of website scraping and examines the first SaaS strategy focused on stopping automated attacks to make the web more secure. View now to learn how to block and/or repurpose these bots to your advantage.

  • SSL Decryption for Greater Threat Visibility

    Sponsored by: Gigamon

    This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.

  • The Rise of Web Bot Attacks and Demise of Traditional Defenses

    Sponsored by: Distil Networks

    This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.

  • Choosing the Right Security Solution: Moving Beyond SSL

    Sponsored by: GeoTrust, Inc.

    This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.

  • Markets and Bounties for Cybercrime Tools and Stolen Data

    Sponsored by: Juniper Networks, Inc.

    This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.

  • 5 Steps to Designing a Next-Gen Firewall

    Sponsored by: Juniper Networks, Inc.

    This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.

  • Insight into Hacker Economics

    Sponsored by: Juniper Networks, Inc.

    This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.

  • Endpoint Protection Platforms for Enterprises

    Sponsored by: Symantec Corporation

    This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • A Buyer's Guide to Endpoint Protection Platforms

    Sponsored by: McAfee, Inc.

    This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.