ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Practical Guide to IT Security Breach Prevention Part II

    Sponsored by: Kaspersky Lab

    With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.

  • Barracuda NextGen Firewalls protect the ever-expanding operation ofGeorgia’s leading telecoms provider, Geocell

    Sponsored by: Barracuda Networks

    Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.

  • Security and availability in extremely adverse environments

    Sponsored by: Barracuda Networks

    Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.

  • Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics

    Sponsored by: Barracuda Networks

    Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.

  • Prevent Data Loss with Exabeam

    Sponsored by: Exabeam

    User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.

  • Gartner Magic Quadrant for Enterprise Data Loss Prevention

    Sponsored by: Intel Security

    This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.

  • Keep Your Data Safe for Office 365

    Sponsored by: Intel Security

    Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.

  • What’s the Problem? Overcoming 4 Key Challenges in Data Privacy

    Sponsored by: Iron Mountain

    Learn the 4 key challenges in data privacy and how to overcome them. Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits.

  • 5-Step Guide For GDPR Compliance

    Sponsored by: Druva Software

    This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.

  • IT Guide: Protecting Corporate Data Beyond the Firewall

    Sponsored by: Druva Software

    24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.

  • Symantec Data Loss Prevention for Cloud

    Sponsored by: Symantec Corporation

    Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.

  • Everything You Need to Know About Crypto Management

    Sponsored by: Gemalto

    Build a Crypto Foundation - a centralized approach to secure various types of data in various types of environments. Learn how to better manage your disparate islands of encrypted data to enable greater security enforcement and overall better efficiency.

  • Why a Modern Security Architecture Matters

    Sponsored by: Palo Alto Networks

    Discover the benefits of an integrated, unified security architecture over the sequential, additive approaches that have evolved the industry. Understand the ability of security architectures to address modern threats while supporting the use of new applications.

  • Protecting Threats in a Small Business Environment

    Sponsored by: CDW

    Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.

  • Achieve a New Level of Security in Healthcare

    Sponsored by: Symantec Corporation

    Uncover the key features your security strategy should include, such as protection of patient information from advanced attacks, secure access to data and applications, reduced risk for regulatory compliance, and more.

  • Internet Security Threat Report: Healthcare

    Sponsored by: Symantec Corporation

    This thorough 108-page threat report examines multiple facets of today's threat landscape including targeted attacks, smartphone threats, social media scams and IoT vulnerabilities to help you secure your healthcare system effectively now and into the future.

  • Eissmann Group Automotive Evaluates NextGen Firewall F-Series

    Sponsored by: Barracuda Networks

    Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.

  • Gartner Magic Quadrant for Endpoint Protection Platforms

    Sponsored by: Intel Security

    This Magic Quadrant report direct from Gartner investigates the quality of endpoint protection platforms, capabilities, the depth of features and the ease of control from current endpoint vendors to help you decide the proper endpoint security platform for your organization (and your budget).

  • Gartner Magic Quadrant for Mobile Data Protection Solutions

    Sponsored by: Intel Security

    Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

  • Practical Guide to IT Security Breach Prevention Part I

    Sponsored by: Kaspersky Lab

    For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.

  • Endpoint Encryption Keeps Your Data Safe

    Sponsored by: Intel Security

    Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.

  • Analyzing the ROI of Cyber Situational Awareness

    Sponsored by: Digital Shadows

    While there are unquantifiable returns associated with greater cyber awareness, there are also calculable cost savings and returns. Access now to learn how you can demonstrate cost savings in a tangible way to your board members.

  • IT Security Vendor Analysis by Bizety

    Sponsored by: Distil Networks

    This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.

  • 13 Questions You Must Ask Your Bot Mitigation Vendor

    Sponsored by: Distil Networks

    Discover 13 tips to help you differentiate between vendors to make a fully informed decision when it comes to your web application security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.