ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • In the Market for a New Key Manager? Then Get in on a Good Thing!

    Sponsored by: Gemalto

    This white paper gives you four key reasons why you need to switch to a central key manager. Learn about a full portfolio of flexible encryption options that work on-premises, in traditional data centers and virtualized cloud environments.

  • The Road to SDN is Paved with Visibility and Many Good Intentions

    Sponsored by: Gigamon

    Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.

  • Addressing the Threat Within: Rethinking Network Security Deployment

    Sponsored by: Gigamon

    A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.

  • Application Session Filtering

    Sponsored by: Gigamon

    Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • Security for Virtualization Getting the Balance Right

    Sponsored by: Kaspersky Lab

    Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

  • Kaspersky in Action

    Sponsored by: Kaspersky Lab

    In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?

  • IDC Server Security: Virtualization and Cloud Changes Everything

    Sponsored by: TrendMicro

    Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.

  • Complete Data Protection (Advanced) - Data Sheet

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • Protecting End of Support Systems

    Sponsored by: TrendMicro

    You have options available to address and reduce your risk. What you need is comprehensive security controls that can protect older systems like Windows Server 2003 while you plan and execute a transition that makes sense for your business. Review the risks facing your organization and learn how you can smoothly transition into newer software.

  • Evaluating Hybrid Cloud Security Options to Control Network Security

    Sponsored by: MASERGY

    This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.

  • Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise

    Sponsored by: Kaspersky Lab

    A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.

  • The Threats From Within

    Sponsored by: Kaspersky Lab

    With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.

  • Virtualization Security: Know Your Options

    Sponsored by: Kaspersky Lab

    Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO

    Sponsored by: Kaspersky Lab

    In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.

  • Future Risks Be Prepared

    Sponsored by: Kaspersky Lab

    An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.

  • Rethinking IT Security

    Sponsored by: Kaspersky Lab

    This eBook explores the features that make antivirus a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.

  • Management of Native Encryption for Apple FileVault and Microsoft BitLocker

    Sponsored by: Intel Security

    With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.

  • Application Session Filtering Cookbook

    Sponsored by: Gigamon

    This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.

  • Storage Efficiencies with Hyper-V at the Virtual and Physical Layer

    Sponsored by: Veeam Software

    Storage tools are important because of the efficiencies they offer, but if you're too afraid of the risks associated with them to fully explore their capabilities, then what good are they? Access this white paper now for an in-depth look at several powerful storage tools and learn how to mitigate their associated risks.

  • Three Critical Considerations to Achieve Information Governance

    Sponsored by: Commvault

    Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.