ComputerWeekly.com Research Library

Powered by Bitpipe.com

Integrated Threat Management Research

  • 7 risk mitigation strategies to protect business operations

    Sponsored by: TechTarget ComputerWeekly.com

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.

  • Combating Today’s Security Threats

    Sponsored by: TechTarget Security

    In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.

  • Thwarting Sophisticated Attacks with Today’s Firewalls

    Sponsored by: TechTarget Security

    This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    Sponsored by: TechTarget Security

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

  • Debunking APT myths: What it really means and what you can do about it

    Sponsored by: TechTarget Security

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

  • Managing Security Risks and Vulnerabilities

    Sponsored by: IBM

    Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

  • Botnets: The dark side of cloud computing

    Sponsored by: Astaro

    Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.

  • Simplifying branch office security

    Sponsored by: Sophos

    Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.

  • Botnets: The dark side of cloud computing

    Sponsored by: Sophos

    Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.

  • Next-generation firewalls are mainstream: What to expect

    Sponsored by: Palo Alto Networks

    Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.

  • E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals

    Sponsored by: Lumension

    Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.

  • Layered Security: Protecting Your Data in Today's Threat Landscape

    Sponsored by: Tripwire, Inc.

    In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

  • WebPulse Collaborative Defense

    Sponsored by: BlueCoat

    Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.

  • Hybrid Clouds

    Sponsored by: Trend Micro, Inc.

    Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.

  • Stopping Fake Antivirus: How to Keep Scareware off Your Network

    Sponsored by: Sophos

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

  • MicroScope September 2011: A special issue examining the security market

    Sponsored by: MicroScope

    Security has remained a good market for the channel to be involved in with the threats continuing to evolve and customers being forced to keep their budgets high in order to maintain protection. Not only are the threats evolving but so are the challenges to channel customers. Continue reading this e-zine to learn more.

  • E-Guide: Striving for Better Information Security Intelligence

    Sponsored by: Tripwire, Inc.

    The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.

  • E-Guide: IT Security and Defence Strategies

    Sponsored by: Kaseya International Limited

    With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.

  • Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems

    Sponsored by: Dell SecureWorks

    View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.

  • Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive

    Sponsored by: Dell SecureWorks

    View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.

  • Risk Management: Protect and Maximize Stakeholder Value

    Sponsored by: Oracle Corporation UK Ltd

    This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.

  • Risk Management: Protect and Maximize Stakeholder Value

    Sponsored by: Oracle Corporation

    This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.

  • Practical Advantages of Fireware® XTM for Hands-On IT Administrators

    Sponsored by: WatchGuard Technologies, Inc.

    Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.