ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Most organizations are aware of the results of not adequately protecting their data, ranging from regulatory penalties to the detrimental costs associated with any data breach. View today's featured resource as we reveal several solutions for protecting data while reducing cost and complexity and allowing for real-time forensic analysis.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • SB-Secure-Access-for-Retail

    Sponsored by: Fortinet, Inc.

    When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • When App is the Business, the Business is the App Vol. 3

    Sponsored by: IBM MaaS360

    IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Builders vs. Breakers: 10 Preventable Online Attacks

    Sponsored by: Pluralsight

    Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.

  • Take Office 365 data security from the cloud into your own hands

    Sponsored by: Symantec Corporation

    This e-guide shows you four key security factors you must consider before you migrate into the cloud. Learn how to properly encrypt and backup sensitive information, without the risk of data leakage or breaches.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • A Powerful Platform for Cloud Security Analytics

    Sponsored by: Exabeam

    Security architects and SOC managers need a solution for integrating activity across all deployments and making sense of behavior in an open, cloud-based architecture. Discover how you can analyze account lockouts, detect unusual access patterns, and prevent data loss while allowing your organizations to continue growing with the cloud.

  • Accelerate the Investigation Process to Find, and Root out Attackers

    Sponsored by: Exabeam

    User behavior intelligence and security session assembly can help enterprises root out attackers that impersonate employees. Discover how the right solution can help you give more complex tasks to junior security analysts while speeding up data analysis.

  • Detect, Prioritize, and Respond to Modern Cyber Attacks

    Sponsored by: Exabeam

    They need the ability to automatically analyze user behavior to respond effectively. Learn how to leverage existing log data to detect modern attacks and prioritize incidents efficiently. Used correctly, user behavior analytics adds a powerful analytics layer over existing security technologies, guiding a more effective response to attacks.

  • Moving from Monitoring to Blocking Content - 5 Best Practices

    Sponsored by: Intel Security

    Whatever the cause - subpar security, human error, unmanaged endpoints, etc. - data loss prevention (DLP) is more important than ever. Your security strategy must be context aware. Learn how to implement context aware, multi-layered content blocking without inhibiting business processes.

  • Protect Company Data with Encryption & Remote Management

    Sponsored by: Intel Security

    Simplify enterprise security management with broad, centralized control and stronger, more efficient options for protecting endpoints. View now to stay ahead of emerging threats with proven TCO-friendly solutions that lock down endpoints and keep data secure without dragging down user or mobile-workforce productivity.

  • Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

    Sponsored by: Intel Security

    DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.

  • Five Tips to Help Protect Your Data - From passive monitoring to proactive protection

    Sponsored by: Intel Security

    Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.

  • Korott Labs trust Barracuda NextGen Firewalls for security, reliabilityand simple centralized management

    Sponsored by: Barracuda Networks

    What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.

  • The Productivity Transformation

    Sponsored by: IBM MaaS360

    Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.

  • Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.