ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Defense-In-Depth with Internal Segmentation Firewalls

    Sponsored by: Fortinet, Inc.

    Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.

  • IT Decision Maker's Cybersecurity Survey 2016

    Sponsored by: Fortinet, Inc.

    This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.

  • Security Analytics Brings Data-Driven Security Into The 21st Century

    Sponsored by: FireMon

    With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. Learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.

  • Firewall Clean Up Recommendations

    Sponsored by: FireMon

    Discover the benefits of proper firewall policy for your organization. Learn the main causes of firewall policy mistakes, which include excessive access, ineffective change management, lack of aging strategy, etc., and how to clean up your current firewall management processes.

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: LogicNow

    Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.

  • Ransomware: Mitigating the Threat

    Sponsored by: Zerto

    Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about on your next enterprise grade IDaaS provider with this buyer's guide.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.

  • Three Golden Rules for Safe and Sound Endpoints

    Sponsored by: IBM

    Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.

  • Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs

    Sponsored by: IBM

    Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • Southern California Edison Protects Workers and Customers with EHS Management

    Sponsored by: SAP

    Discover how Southern California Edison, the largest subsidiary of Edison International, is using environment, health, and safety (EHS) management tools to streamline management of operational risks and environmental compliance processes. Learn what 4 objectives they were looking to solve with an EHS app and 7 benefits they're receiving.

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.

  • A Network Security View Of Docker Containers

    Sponsored by: NeuVector

    Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.

  • Guide & Checklist to Container Security

    Sponsored by: NeuVector

    This guide will present some of the threats to running containers and provide a checklist with 15 tips for securing containers in production.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Top 3 Cybersecurity Challenges Facing Healthcare Organizations

    Sponsored by: Arctic Wolf Networks, Inc.

    Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.

  • The Top Cybersecurity Risks – And How Enterprises Are Responding

    Sponsored by: Arctic Wolf Networks, Inc.

    Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.

  • Reduce Open Source Security Risk: Strategies, Tactics and Tools

    Sponsored by: Rogue Wave Software

    Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.

  • Secure Your Connected Medical Devices

    Sponsored by: Zingbox

    Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.

  • 4 Strategies to Reduce Your Open Source Risk

    Sponsored by: Rogue Wave Software

    Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.