ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • SANS Top 20 Critical Security Controls for Effective Cyber Defense

    Sponsored by: TrendMicro

    In order to help, the SANS Institute, working in concert with the Center for Internet Security (CIS), created a comprehensive security framework that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements.

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • SB-Secure-Access-for-Retail

    Sponsored by: Fortinet, Inc.

    When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • When App is the Business, the Business is the App Vol. 3

    Sponsored by: IBM MaaS360

    IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Take Office 365 data security from the cloud into your own hands

    Sponsored by: Symantec Corporation

    This e-guide shows you four key security factors you must consider before you migrate into the cloud. Learn how to properly encrypt and backup sensitive information, without the risk of data leakage or breaches.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • A Powerful Platform for Cloud Security Analytics

    Sponsored by: Exabeam

    Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.

  • Accelerate the Investigation Process to Find, and Root out Attackers

    Sponsored by: Exabeam

    User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.

  • Detect, Prioritize, and Respond to Modern Cyber Attacks

    Sponsored by: Exabeam

    They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.

  • Moving from Monitoring to Blocking Content - 5 Best Practices

    Sponsored by: Intel Security

    Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.

  • Protect Company Data with Encryption & Remote Management

    Sponsored by: Intel Security

    Simplify your security enterprise security management with broad, centralized control with stronger and more efficient options for protecting endpoints. Stay ahead of emerging threats and improve user experience all will lowering the TCO to your organization.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    The benefits of data loss prevention (DLP) have a strong correlation with detecting and preventing data exfiltration. Discover the security tools, response plans and awareness training your organization needs to protect against data exfiltration and prevent major losses.

  • Five Tips to Help Protect Your Data - From passive monitoring to proactive protection

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Korott Labs trust Barracuda NextGen Firewalls for security, reliabilityand simple centralized management

    Sponsored by: Barracuda Networks

    What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.