ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Unlocking Business Success The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.

  • FortinetCSO_QP

    Sponsored by: Fortinet, Inc.

    This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.

  • Data Theft Prevention The Key to Security, Growth & Innovation

    Sponsored by: Forcepoint

    This white paper shows you a holistic approach to protecting your critical data. Learn about cybersecurity from a Data Theft Prevention perspective, which is broader in scope and more effective in defending sensitive information.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Protecting_Against_APTs_minibook

    Sponsored by: Fortinet, Inc.

    This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.

  • Cybersecurity and Data Theft Prevention

    Sponsored by: Forcepoint

    This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.

  • Cyber Dwell Time and Lateral Movement

    Sponsored by: Forcepoint

    Today's organizations should not only focus on keeping hackers out, but also remediating damages once a breach occurs. This white paper shows you how to best deal with cyber attackers once a breach happens and how to keep attackers afraid to come back.

  • SG-ISFW-Fortinet

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.

  • Forrester Report -Building_An_Effective_Breach_Detection_And_Response_Strategy

    Sponsored by: Fortinet, Inc.

    This white paper shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.

  • Advanced Threat Protection Buyer's Guide

    Sponsored by: Fortinet, Inc.

    This white paper helps you assess your current security posture against a baseline set of requirements. Access now to ensure you're using the right solution set to fit your organization.

  • Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.

  • Building an Enterprise Security Architecture

    Sponsored by: Forcepoint

    This ESG report outlines the current security problems faced by organizations across industries and shows you new methods to tackle them. Access now to learn how you can get an enterprise security architecture built for integration, central command and control, distributed enforcement and comprehensive monitoring.

  • The human factor research report 2016

    Sponsored by: Proofpoint, Inc.

    This white paper takes an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.

  • How Credential Phishing is Changing - How to Stop It

    Sponsored by: Proofpoint, Inc.

    This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.

  • Three guiding principles for data security and compliance

    Sponsored by: IBM

    This white paper talks about the world's growing focus on data protection and what current challenges organizations face. Access now to discover why you need a comprehensive approach to data security and learn three guiding principles to achieve better security compliance.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Arming the front line

    Sponsored by: IBM

    This white paper teaches you why antivirus software and firewalls on consumer endpoints aren't sufficient to combat today's sophisticated hacking tools. Access now to learn common misconceptions about endpoint protection and what unexpected benefits you can realize by extending protection to customer endpoints.

  • Fraud Protection Doesn't have to be an uphill battle

    Sponsored by: IBM

    This white paper shows you how you may reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.

  • Detecting Malware-Free Intrusions and Advanced Cyber Threats with Anomaly Detection and "Behavioral MD5" of Endpoint Processes

    Sponsored by: Prelert

    This report shows you how machine learning can detect changes in endpoint process behavior to help protect your business. Access now to learn how you can automate the analysis of data by looking for helpful anomalies that indicate malicious activity.

  • Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!

    Sponsored by: Prelert

    This report dispels misconceptions about machine learning and explains what its actual application is. Access now to learn about recent developments in machine learning-based security analytics capabilities.

  • A Guide to Corporate Social Media Security

    Sponsored by: Proofpoint, Inc.

    This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.

  • IBM 2015 Cyber Security Intelligence Index for Information and Communication

    Sponsored by: IBM

    This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.

  • 2015 Frost & Sullivan Asia-Pacific Intrusion Detection & PreventionVendor of the Year - IBM

    Sponsored by: IBM

    This white paper shows you how greatly IDS/IPS is growing in Asia Pacific are other methods they are using to stay ahead of advanced threats. Access now to improve your organization's awareness of these threats and prepare yourself against sophisticated threats in the future.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.