ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Broadening Your VDI Horizon Beyond Thin Client Devices

    Sponsored by: Dell, Inc. and Intel®

    This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.

  • Why it's Time for Locked-Down Desktops

    Sponsored by: Dell, Microsoft and Citrix

    Access this exclusive e-guide to take a look at why IT teams are locking down desktops in order to restrict user-installed apps (UIAs). You'll also explore the benefits locked-down desktops can have on IT departments.

  • Physical vs. Virtual Desktop Security: It's Just Not The Same

    Sponsored by: Dell, Inc. and Intel®

    This expert e-guide discusses the differences in security methods between physical and virtual desktops. Download now and you'll get access to a handy table with a complete breakdown of physical and virtual desktop security risks and techniques.

  • Virtual Desktop Security: Exploring VDI Features

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell, Microsoft and Citrix

    This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

  • Endpoint Threat Detection Gets More Response

    Sponsored by: Solarwinds MSP

    This white paper explains what cyber threats the United States faces on a daily basis and what tools they have to combat them.

  • Computer Weekly – 1 December 2015: Balancing speed and risk in IT projects

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as IT leaders face boardroom pressure to roll out IT projects ever more quickly, we examine how to do that without running unacceptable risks. Michael Dell talks about how he sees the future for his company when it buys EMC. And we hear from IT chiefs about the challenges of implementing DevOps. Read the issue now.

  • "Hacking as a Service," and Other Emerging Threats

    Sponsored by: TechTarget Security

    Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.

  • What to Look for in Vulnerability Management

    Sponsored by: TechTarget Security

    This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Is it time for a DLP system in your enterprise?

    Sponsored by: TechTarget Security

    Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Fighting Cybercrime in the 21st Century

    Sponsored by: TechTarget Security

    Strengthen your security with these expert insights into fighting advanced crimeware.

  • Next-Generation Security in a Mobile Era

    Sponsored by: TechTarget CIO

    Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.

  • The Essential Guide for Threat Intelligence Services: What to Look For

    Sponsored by: TechTarget Security

    This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.

  • CIO Decisions E-Zine - February 2015

    Sponsored by: TechTarget CIO

    When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.

  • The Bot Threat

    Sponsored by: Hewlett Packard Enterprise

    In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.

  • Cost of a Breach Rising; How to Protect Against It

    Sponsored by: TaaSera

    This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.

  • How to Deal with Increasing DDOS Attacks

    Sponsored by: Verisign, Inc.

    This expert e-guide explores how to protect your organization from distributed denial of service attacks.

  • Manage Your Operational Big Data Like a Super Hero

    Sponsored by: IBM

    Learn about an industry-leading vendor's solution for IT operations analytics that can help you manage big data.

  • IBM System x Family Brochure

    Sponsored by: Lenovo and Intel

    If you’re looking for ways to create a dynamic infrastructure, look no further. This brochure shows how IBM System x and BladeCenter servers help to deliver an infrastructure that reduces operating costs, manages present and future risk, and improves services.

  • High Alert on Cyber-Risk and Cyber-Security Preparedness

    Sponsored by: SurfWatch Labs

    This expert e-guide offers an in-depth exploration of cyber intelligence and covers why you need to be on high alert for cyber-risk and cyber-security preparedness.

  • How Threat Intelligence Can Give Enterprise Security the Upper Hand

    Sponsored by: SurfWatch Labs

    This expert e-guide explores the value of security intelligence in giving you the upper hand on outside threats.

  • 6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data

    Sponsored by: Symantec & Blue Coat Systems

    How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.