ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Remove the Security Blind Spots Created by Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.

  • Conquer Threats with Collaborative, Scalable Security Intelligence

    Sponsored by: IBM

    Meet new and sophisticated security threats head-on with adaptable SIEM tools that can scale as your organization does. Discover the power to act at scale with a fast and easy, cost-effective method to meet changing security needs.

  • Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard

    Sponsored by: IBM

    This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.

  • 2016 Global Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.

  • 2016 Cyber Threat Defense Report

    Sponsored by: Blue Coat Systems

    In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.

  • How To Foster Greater Collaboration and Support Enterprise Objectives Through Business Networks

    Sponsored by: Basware

    40% of B2B activity in the US, and 20% world-wide, is done electronically through business networks. Access this white paper to learn what business networks are capable of, and discover how to create circles of improved collaboration and support enterprise objectives.

  • New EU Security Requirements and You

    Sponsored by: Blue Coat Systems

    Discover new EU security requirements and learn what you can do to get ready. Create a holistic approach to data protection and infrastructure security to best avoid compliance risk.

  • Threats and Mitigations: A Guide to Multi-Layered Web Security

    Sponsored by: Akamai

    Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Advanced Security for vCloud Air

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper details a solution that provides comprehensive security tailored to protect hybrid cloud environments, so you can feel confident about extending your data center applications and workflows to the cloud.

  • Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

    Sponsored by: TrendMicro

    See how security pros and decision makers are responding to the increased frequency, volume and ferocity of today's cyber threats to endpoint devices. Discover what realizations they've come to about their own security tools and posture and learn just how inadequate your current threat protection most likely is.

  • Comprehensive Security for Amazon Web Services

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper discusses a solution that delivers comprehensive security tailored to protect cloud environments, allowing you to confidently extend your data center applications and workloads to the cloud. Learn how to protect your cloud now.

  • Cybersecurity: The Ethics and Compliance Effect

    Sponsored by: Navex Global

    Learn the important role ethics and compliance can play in your cybersecurity program and become better equipped to deal with security incidents.

  • Threat Summary: Top 2016 Cyber Risks

    Sponsored by: Proofpoint, Inc.

    Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.

  • Preventing internal Cybersecurity Breaches

    Sponsored by: Navex Global

    Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.

  • A Path to Good Risk Taking Through Data Analytics

    Sponsored by: SAS

    This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.

  • User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases

    Sponsored by: LogRhythm, Inc.

    Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.

  • Case Study: Alliant Credit Union Evolves Real-Time Fraud Detection

    Sponsored by: LogRhythm, Inc.

    Read this case study to determine how Alliant Credit Union automated analysis of fraud-related patterns and trends in real time, by consolidating all machine data from IT events and financial transactions on one SIEM platform.

  • Protect Medical Data and Prevent Ransomware Attacks in Healthcare

    Sponsored by: VASCO, INC.

    Access this e-guide to discover how to fend off cybercriminals using a three-layered approach to healthcare data protection, and read insights from one hospital CIO on both preventing a ransomware attack and recovering from one.

  • Firmwide Scenario Analysis and Stress Testing: Risk Perspective

    Sponsored by: SAS

    Stress testing is a vital aspect of any business' success. Special techniques have emerged in recent years after the recent financial crisis. Access this white paper to learn about the future of firmwide stress testing, the importance of risk management, and more.

  • Best Practices for Securing Microsoft Azure Hybrid Clouds

    Sponsored by: Check Point Software Technologies Ltd.

    This white paper discusses the best practices for securing your Microsoft Azure Cloud environment. Learn how to provide uncompromising protection against even the most sophisticated cyberattacks now.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • Outthinking Cybercrime: Prepare for the Human Factor

    Sponsored by: Trustwave

    Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.