ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Information Security Consulting Services Report

    Sponsored by: IBM

    This Forrester report evaluates 13 most significant information security consulting service providers against a 31 point criteria. It details how well these consultancies fulfill the criteria and where they stand in relation to each other.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Risk Register and Matrix

    Sponsored by: Databarracks

    Gain access to a Risk Register and Matrix, which allows you to choose specific threats your organization faces and visualize them according to their likelihood of happening and the severity of their potential impact to find out the influence they have on your organization.

  • The case for security intelligence services, hosted from the cloud

    Sponsored by: IBM

    Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.

  • 2016 Cyber Security Intelligence Index

    Sponsored by: IBM

    This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Gartner 2016 Magic Quadrant for Identity Governance and Administration

    Sponsored by: IBM

    This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For better access governance, look beyond roles to entitlements

    Sponsored by: IBM

    Learn how to better enforce segregation-of-duties policies to ensure that currently authorized users don't have conflicting entitlements. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don't retain access after they leave the organization.

  • Tolly evaluation: IBM Security Access Manager

    Sponsored by: IBM

    In this white paper, Tolly evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.

  • Ransomware Multi-layered Approach

    Sponsored by: TrendMicro

    Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.

  • Simplify Your Google Apps Collaboration and Management with IDaaS

    Sponsored by: OneLogin

    This informative webinar is designed to get you through the most complex of Google App deployments.

  • Engineering Company's Multi Cloud Success Story

    Sponsored by: TrendMicro

    Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Dimension Data

    In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.

  • Manufacturing Company's AWS Success Story

    Sponsored by: TrendMicro

    If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.

  • How Healthcare Benefits from Cloud-Delivered Security

    Sponsored by: OpenDNS

    Cloud-delivered security is a cost-efficient and flexible method for dealing with healthcare security threats, while also improving your organization's ability to meet expanding compliance mandates. Discover how you can protect the full range of systems and requirements in your organization.

  • Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices

    Sponsored by: Lenovo Software

    This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.

  • IDaaS: Modernize Your IAM in the Cloud

    Sponsored by: OneLogin

    Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).

  • The 411 on Mobile Application Security Testing and Runtime Protection for iOS Applications

    Sponsored by: IBM

    This webcast provides best practices for mobile application testing for security vulnerabilities and protecting them at runtime, with a special emphasis on iOS applications. You'll learn how to protect your ever-expanding portfolio of mobile apps, to stay one step ahead of the rush-to-release phenomenon.

  • Uncovering the Risk of SAP Cyber Breaches

    Sponsored by: Onapsis

    The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications

    Sponsored by: Onapsis

    Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.

  • Account Takeover How Hacking Happens in 2016

    Sponsored by: IMMUNIO, Inc.

    This white paper helps you understand what's inside the head of a modern cybercriminal and the techniques they use to steal your hard earned data. Through this understanding, you'll be able to improve your security posture and reduce the likelihood of a breach quickly.

  • Protecting Mission-Critical Source Code from Application Security Vulnerabilities

    Sponsored by: IBM

    In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.

  • Making the Case for Application Security Testing on Cloud

    Sponsored by: IBM

    It presents to you the pros and cons of application security testing and penetration testing techniques. Discover how you can combat application security threats conveniently and effectively in the cloud.

  • Deep Security Protection from Ransomware

    Sponsored by: TrendMicro

    Ransomware is increasingly targeting servers, where attackers use known software vulnerabilities to inject ransomware. Learn how to protect your servers from ransomware attacks through anti-malware, intrusion prevention, integrity monitoring and web reputation.

  • 5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks

    Sponsored by: IBM

    A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.