ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Protecting Web Services for Grand Slam Roland-Garros

    Sponsored by: EfficientIP

    Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.

  • Addressing the Full Attack Continuum (BDA WP)

    Sponsored by: Cisco Systems, Inc.

    It's time for a new threat-centric security model that delivers the visibility and control your organization needs. Discover how to reduce the complexity of threat management while gaining continuous control and advanced threat protection across the entire attack continuum. Act smarter and quicker before, during and after an attack.

  • Buyer's Guide - DAG

    Sponsored by: STEALTHbits

    This white paper will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.

  • Securing Connected Cars Through Comprehensive Software Testing

    Sponsored by: Synopsys

    There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.

  • Data at Rest: Pragmatic Approach to Data Security

    Sponsored by: STEALTHbits

    There are also risks associated to having all that data spread throughout the IT ecosystem. Discover the risks associated with unstructured data and how to best approach these risks. Understand why getting a handle on your data at rest can get you the security results you desire.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.

  • Operationalize Security to Patch Vulnerabilities

    Sponsored by: BMC

    This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.

  • Here's What Your Personal Data is Going for on the Dark Web

    Sponsored by: BMC

    How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.

  • Enabling The Industrial Internet Through Software Assurance

    Sponsored by: Synopsys

    Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.

  • Best Practices for Social Media Archiving and Security

    Sponsored by: Proofpoint, Inc.

    While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.

  • IDC: Rethinking the Network as a Security Sensor and Enforcer

    Sponsored by: Cisco Systems, Inc.

    Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.

  • NGFW Requirements for SMBs and Distributed Enterprises

    Sponsored by: Cisco Systems, Inc.

    Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • Simplifying Security Engineering With Effective Network Segmentation

    Sponsored by: Cisco Systems, Inc.

    Forrester Consulting conducted a Total Economic Impact (TEI) study and examined the potential return on investment enterprises may realize by deploying Cisco TrustSec. Access this report to explore and evaluate the potential financial impact of Cisco TrustSec on your organization.

  • The ROI of Enterprise-Wide E-Discovery: How To Save 5 Million Dollars

    Sponsored by: Proofpoint, Inc.

    Access this resource to learn how to maximize your e-discovery ROI. You will learn the difference between collection and review savings. See how your organization can get an ROI of close to 5 million dollars annually.

  • HEB Grocery Store Patches Office 365 Security Flaws

    Sponsored by: Proofpoint, Inc.

    Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.

  • Is Microsoft Office 365 Secure?

    Sponsored by: Proofpoint, Inc.

    How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: NTT ICT

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond

    Sponsored by: Lookout

    Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: SearchSecurity.com

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • 2016 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.

  • Communications as a Service: Improving Response Time and Resiliency During Critical Events

    Sponsored by: IBM

    Safeguard your organization during downtime by leveraging cloud-enabled crisis and incident management. Read on to improve operational processes during unplanned critical events with a service that will boost response effectiveness via real-time situational awareness, demonstrate regulatory compliance, and more.

  • DR Tabletop Testing Simulator

    Sponsored by: Databarracks

    Explore three disaster scenarios and answer the provided questions to reveal the appropriate recovery steps for each situation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.