ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Ransomware: Defending Against 5 Major Types

    Sponsored by: Commvault

    Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.

  • What is GDPR? And Why Should I Care?

    Sponsored by: Commvault

    The General Data Protection Regulation (GDPR) will kick in May 2018, and it will have a huge impact on how you collect and manage the personal data of EU residents, even if you're not located in Europe. Get an overview of the GDPR, including who the legislation affects and the penalties for non-compliance.

  • The Security Benefits of Prioritizing Critical Data Assets

    Sponsored by: InteliSecure

    Do you know what your critical data assets are? This 6-part white paper explores how to define your critical data assets so you can save time and money, all while improving your security posture.

  • Meeting Top Data Protection Challenges

    Sponsored by: Avnet

    This white paper explores a strategy that can help you meet top data protection challenges, including cloud security, GDPR requirements, and ransomware attacks.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • How to Create a Cybersecurity Policy for Your Organization

    Sponsored by: HelpSystems

    Discover a 4-step plan to build a cybersecurity policy for your organization. As a bonus, uncover additional resources to create a data breach response plan.

  • Achieve GDPR Readiness with Secure App and Data Delivery

    Sponsored by: Citrix

    A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.

  • The Race to Meet GDPR Compliance

    Sponsored by: HyTrust

    No matter where you are in the world, if you do business within the EU, you need to be prepared for GDPR compliance. This white paper provides an overview of the GDPR so you can get ready.

  • Compliance As Code - A Visual Guide

    Sponsored by: Flux7

    Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.

  • Threat Research Report: The Anatomy Of A Ransomware Attack

    Sponsored by: Exabeam

    This extensive research report explains ransomware behavior and how you can protect your network. Inside you will gain access to a ransomware cheat sheet and a glossary of security terms.

  • How Machine Data Supports GDPR Compliance

    Sponsored by: Splunk

    Discover an overview of the GDPR and explore how machine data can help you meet the core requirements. Uncover the 3 ways machine data can help support your GDPR compliance program.

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • Strengthen Your Ransomware Strategy

    Sponsored by: AdvizeX Technologies

    Everyone knows that ransomware is a significant concern, but there are many questions surrounding this threat. It's time to get answers. Use this webinar to strengthen your ransomware strategy, as it walks you through the security functions to help you detect, prevent, and recover from attacks.

  • Case Study: How A Global Agro-Industrial Leader Established Security To Grow On

    Sponsored by: Cisco Umbrella

    In this case study, learn how Avril Group, a major industrial and financial group in France, used Cisco Umbrella to establish consistent security coverage across a distributed global organization that continues to expand through acquisitions.

  • Cisco Umbrella: How does it Improve Security Effectiveness?

    Sponsored by: Cisco Umbrella

    Threat detection and prevention is crucial to the security of your business. Join Steve Martino, CISO of Cisco, and his staff as they explain the value of Cisco Umbrella in improving overall security effectiveness.

  • Cisco Umbrella Investigate: Threat Intelligence Overview

    Sponsored by: Cisco Umbrella

    Enterprises today face huge challenges in information security. Attackers are waiting around every corner to cause damaging breaches. In this brief overview, learn about Cisco Umbrella Investigate, which provides threat intelligence about domains and IPs across the Internet.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • Security Product Overview: Cisco Umbrella

    Sponsored by: Cisco Umbrella

    Over 1/2 of the PCs in organizations are mobile – which means you need to protect your workforce wherever they access the internet. In this product introduction, learn about Cisco Umbrella, a cloud-delivered network security service that protects any device, anywhere.

  • How LepideAuditor Helps You Detect and Prevent Insider Threats

    Sponsored by: Lepide Software

    Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.

  • Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance

    Sponsored by: HyTrust

    In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.

  • Product Overview: 30 Minutes to a More Secure Enterprise

    Sponsored by: Cisco Umbrella

    DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.

  • The Explosion of Third-Party Apps: 27% are Risky

    Sponsored by: Cisco Cloudlock

    Of all the apps granted access to corporate systems last year, 27% of third-party apps were classified as high-risk. Learn more about the impact of Shadow IT, third-party apps, and cloud on security. Plus, uncover the top 10 risky apps and the top 10 most trusted ones.

  • The Top 5 DevOps Challenges

    Sponsored by: Delphix

    The key to deploying DevOps is data management. IT pros need data for their environments, but that need grows exponentially when it comes to DevOps. But this is just the tip of the iceberg. Read on to discover the top five challenges halting your DevOps progess.

  • 6 Ways to Keep Your Endpoint Devices Secure

    Sponsored by: Sentinel Labs, Inc.

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.