ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • How to Plan and Execute Modern Security Incident Response

    Sponsored by: ThreatConnect

    This document looks at how today's organizations perform security incident response, shares the lessons learned from IR leaders, and provides recommendations for other organizations to improve their IR maturity and thus reduce enterprise risk.

  • ATP Sandboxing White Paper

    Sponsored by: Fortinet, Inc.

    This white paper offers you the ultimate combination of proactive mitigation, visibility and rich reporting. Access now to learn about antivirus and threat-scanning technology, dual-level sandboxing and the option of additional integration with the cloud.

  • Data Breach Investigation Report

    Sponsored by: Verizon

    This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.

  • 4 Steps to Implementing Data Protection in Healthcare

    Sponsored by: Digital Guardian

    This white paper talks about important compliance policies that every healthcare organization must be in compliance with and how to best comply with these regulations using Data Loss Prevention tools.

  • Forrester Report - Industry Spotlight: US Healthcare Security Budgets and Priorities

    Sponsored by: Digital Guardian

    This white paper helps healthcare security professionals learn from their peers and provides best practices for addressing critical security risks. Access now to learn how you can better protect private patient information and retain your organization's good reputation.

  • The Executive’s Guide to the 2016 Global Threat Intelligence Report - Insights to protect your organisation against cybercrime in the digital era

    Sponsored by: Dimension Data

    This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.

  • 2016 Global Threat Intelligence Report - Insights to Protect your Organisation against Cybercrime in the digital era

    Sponsored by: Dimension Data

    This white paper shows you statistic about the past year's detected cyberattacks and gives you insight to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.

  • Taking Container Security to the Next Level Final

    Sponsored by: Black Duck Software

    This white paper explores the security concerns around container use and details how security professionals can enact measures to mitigate the dangers. Access now to learn how you can protect code integrity when containers are in use and safely utilize open source code in general.

  • SCIENCELOGIC: Unmatched Visibility into Open Source with Black Duck

    Sponsored by: Black Duck Software

    This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improved efficiency and, most importantly, security by reviewing their code before their products hit the market and seeing exactly what they needed to change.

  • MAX-Mail-Email-Security-11-04-16

    Sponsored by: LogicNow

    This white paper looks at email security for mid-sized businesses. Explore solutions available and what features these organizations cannot do without.

  • The Total Economic Impact Of Forcepoint’s SureView Insider Threat Single Company Analysis

    Sponsored by: Forcepoint

    This white paper shows you an appliance-based security system that monitors and investigates internal threats across all endpoints and channel communications.

  • Virtualization Best Practices Guide

    Sponsored by: Kaspersky Lab

    This white paper shows you how to best protect your virtual desktops through a wide range of Windows-based environments. Choose the security approach that's best for your business' specific virtual needs.

  • IT Risk Report 2015

    Sponsored by: Kaspersky Lab

    This report shows you the results of a security survey of organizations across industries. Access now for exclusive insight into the views, opinions and strategies of IT professionals from around the world.

  • ESG_Lab_Validation_Fortinet_ATP

    Sponsored by: Fortinet, Inc.

    This white paper shows you an end-to-end modular framework for addressing cybersecurity using advanced threat protection. Access now to learn how to automate your identification, prevention and mitigation of malware, providing protection throughout your ecosystem.

  • Under Siege: The CyberSecurity Threat

    Sponsored by: Black Duck Software

    This white paper helps you find out before you start development whether your open source code has known vulnerabilities. Immediately find out when new vulnerailities surface in your code and find out how to fix them.

  • GLOBAL BANK REDUCES SECURITY RISKS & REAPS COST BENEFITS OF OPEN SOURCE

    Sponsored by: Black Duck Software

    This white paper shows you how to properly identify and implement OSS to fit your business' needs. Save time and money by automating the management of open source code from the point it enters your organization and through development.

  • What Is the Cost of One More Test?

    Sponsored by: Ixia

    This white paper gives you up to date statistics on today's cyber threat landscape and shows you how you can get ahead with early prevention. Access now to see where other organizations failed and how you may better protect yourself against today's most dangerous attacks.

  • The Workstation Monitoring Imperative

    Sponsored by: Intersect Alliance

    This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.

  • Unlocking Business Success The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    This white paper shows you how to embrace a BYOD policy for your organizations and best practices for visibility into all user activity. Access now to gain a formidable defense against both malicious and unintentionally harmful insiders.

  • FortinetCSO_QP

    Sponsored by: Fortinet, Inc.

    This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.

  • Six Steps To A Better Security Strategy

    Sponsored by: AllClear ID

    In this white paper, you'll learn six steps to create an effective security strategy that's linked with key business interests for great success.

  • Protecting_Against_APTs_minibook

    Sponsored by: Fortinet, Inc.

    This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.

  • Best Practices for Protecting Patient Data in the Cloud

    Sponsored by: Digital Guardian

    Now that many healthcare organizations are using cloud computing to store and share sensitive patient information, they must figure out how to extend data loss prevention (DLP) strategies to include cloud storage. Discover best practices for applying DLP to the cloud.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.