ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • An Enterprise Security Program and Architecture to Support Business Drivers

    Sponsored by: Above Security

    This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.

  • Ransomware

    Sponsored by: OpenDNS

    This podcast looks at ransomware and how the cybercrime business operates.

  • Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Application Defense In Depth

    Sponsored by: IMMUNIO, Inc.

    The best security solutions for web applications build a layer of protection inside and around your apps. Learn how to control access, monitor activity and clean-up input to your applications. Paint an accurate picture of your threat environment to get actionable reports when vulnerabilities are found within your applications.

  • SC Mag Reviews a SIEM Platform

    Sponsored by: LogRhythm, Inc.

    Learn how you can upgrade to next-generation SIEM with artificial intelligence, sophisticated pattern recognition and behavioral analysis. Discover a 5-star review of a SIEM platform with a breakdown of its strengths, weaknesses and more.

  • 5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare

    Sponsored by: Citrix

    Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.

  • Compliance - The New Hot Button for CIOs

    Sponsored by: VMware

    This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.

  • How to Detect a Ransomware Attack Before it's too Late

    Sponsored by: LogRhythm, Inc.

    Your organization's defense success against ransomware depends largely on your level of preparation and the tools you deploy to monitor your systems. Learn how effectively defend against catastrophic attacks through early detection and elimination of suspicious activity.

  • DDoS Attack Stats & Trends

    Sponsored by: Akamai

    This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.

  • Comparing App Security Strategies: WAFs vs. RASP

    Sponsored by: IMMUNIO, Inc.

    Examine the current threat landscape for web applications and the approaches you should take to secure those applications. Uncover a comparison of one of the most common approaches – Web Application Firewalls (WAFs) - with the most recent addition to the application protection arsenal, Run-Time Application Self-Protection (RASP).

  • Why DDoS Prevention Appliances are So Important Today

    Sponsored by: Arbor Networks

    Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..

  • How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Sponsored by: Schneider Electric

    This white paper details common distributed server room and remote wiring closet downtime incidents and poses recommendations for how monitoring and automations software integrated with video surveillance and sensors can reduce human error related downtime.

  • SunRice Reboots Their Cyberthreat Defense & ROBO Network Security

    Sponsored by: Palo Alto Networks

    In this case study, SunRice illustrates how to leverage a centralized security policy management platform to bolster cyber-threat defense and improve visibility of network infrastructure. Access now to streamline network security management and learn how to consolidate outdated legacy appliances.

  • Five Essential Elements for an Effective Mobile Security Strategy

    Sponsored by: vmware airwatch

    End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.

  • Web Application Security: Is your Site Vulnerable to Attackers?

    Sponsored by: Akamai

    This short infographic shows you the importance of intelligent security for your web applications including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.

  • Overcoming the challenges presented by mobility in the enterprise

    Sponsored by: IBM MaaS360

    This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.

  • Network Optimizations to Deliver Rich, Dynamically Generated Content

    Sponsored by: Akamai

    Online shoppers want entertainment, personalization, and instant gratification. While this is possible, it usually means slow page downloads. Discover how to deliver on customer expectations without damaging the experience or your brand's reputation.

  • Insider Threat Spotlight Report

    Sponsored by: Exabeam

    High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.

  • ‘But I Was Compliant’

    Sponsored by: Armor

    Learn how to take a holistic approach to security and, in the process, easily meet regulatory requirements. Look beyond your checklist to ensure data security and the health of your organization.

  • The Definitive Guide to Data Loss Prevention Healthcare Edition

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • The Threat Defense Lifecycle — Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.

  • The Threat Defense Lifecycle — Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.

  • The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.