ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Assessment Research

  • Key Issues for E-Discovery and Legal Compliance

    Sponsored by: Smarsh

    Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with eDiscovery issues. In this Osterman Research report, uncover insight from the results from an in-depth survey of decision makers and influencers at mid-sized and large organizations

  • 4 Critical Elements of a Successful GRC Implementation

    Sponsored by: Rsam

    Uncover 4 critical factors organizations should consider before designing their GRC deployment so that they can properly satisfy key use case needs, mitigate risks, and meet compliance regulations.

  • How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats

    Sponsored by: Rapid7

    In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.

  • When Software Goes Rogue

    Sponsored by: BDNA

    How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.

  • Develop Your Information Security Management System

    Sponsored by: SAI Global IT Risk Manager (Formerly Modulo Risk Manager)

    This Forrester Research report explores how to use an information security management system (ISMS) to improve risk management and strengthen security processes. Find out how to derive daily value from an ISMS, increase customer data protection, leverage KPIs and threat intelligence, and more.

  • Enterprise Endpoint Security Benchmark Performance Report

    Sponsored by: Symantec & Blue Coat Systems

    This white paper presents the results of an independent test of four leading endpoint security solutions against 17 performance metrics. Read on to get all the facts you need to determine 2017's endpoint security market leaders.

  • Focus: how to avoid being hit by ransomware

    Sponsored by: ComputerWeekly.com

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

  • Predicts 2017: Lead, Follow, or Get Out of the Way

    Sponsored by: Google Cloud

    In this report, Gartner made predictions for 2017 that swept the entire IT landscape. This report isn't just about various tech predictions, but predictive disruption, the uncertainty that comes with the constant resetting of expectations. See how CIOs should approach predicting the future of their organizations' technological landscape.

  • Bracing for Digital Disruption: What the CIO Needs to Know

    Sponsored by: Infor

    This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.

  • Why Organizations Still Struggle to Digitally Transform & Innovate

    Sponsored by: TechData - Veeam

    Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.

  • NSS Labs Advanced Endpoint Protection Test Report

    Sponsored by: McAfee, Inc.

    NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this endpoint strategy and its security effectiveness.

  • User and Entity Behavior Analytics for McAfee Enterprise Security Manager

    Sponsored by: McAfee, Inc.

    This document provides an overview of core UEBA capabilities available in McAfee Enterprise Security Manager and introduces the many partners whose products are tightly integrated and certified with this security platform.

  • Service Visibility: Your Green Light to a Clear Road Ahead

    Sponsored by: ServiceNow

    Without the right information, you won't be able to make the best decisions. Why would you let your IT operations run blind? Automated service mapping gives you the service visibility you need so that you always have an accurate, up-to-date view of your business services.

  • The Importance of Incident Management Services

    Sponsored by: Dell SecureWorks

    The worst time to realize you are not prepared for a security incident is during a breach. Without a proven response plan or strategy, stressed personnel must make crucial decisions without a clear sense of order and priority. Discover how to prepare your enterprise for a security incident in this white paper.

  • Managed Detection and Response

    Sponsored by: Dell SecureWorks

    Being resilient to a threat from an advanced adversary is dependent on your organization's integrated capabilities to quickly detect them and respond. In this white paper, learn how you can employ and tune the security tools at your organization to combat today's threats.

  • Pilot Light DR for Amazon Web Services

    Sponsored by: CloudVelox

    Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.

  • How to Keep Your Data Secure In An Increasingly Insecure World

    Sponsored by: Micron

    Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.

  • Object Storage 101

    Sponsored by: ComputerWeekly.com

    Standard file and block storage have their places, but there is an increasing move to object storage to meet the governance, risk and compliance needs of organisations, while also providing enhanced information management capabilities, say analysts Clive Longbottom and Marcus Austin.

  • Are we trusting social networks too much?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

  • Global Risks Report 2017

    Sponsored by: ComputerWeekly.com

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

  • When Downtime Takes a Bite out of Your Budget

    Sponsored by: Globalscape

    Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.

  • Your Data on the Move: Taking Back Control of Your Most Precious Asset

    Sponsored by: Globalscape

    This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.

  • Risk Assessment: The Roles Vendors and Frameworks Play

    Sponsored by: BitSight

    Assessing risk is vital to protecting your organization. Discover how to mitigate the risk that third-party vendors present to your organization with an effective, risk-driven assessment framework.

  • Methods for Preventing Hospital Ransomware Infections and Cyberattacks

    Sponsored by: Cisco Umbrella

    The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.

  • Application Security Testing Vendor Evaluations

    Sponsored by: Veracode, Inc.

    This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.