ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Breach Detection Systems Test Report

    Sponsored by: TrendMicro

    This report shows you independent test results of a breach detection system. Uncover the overall test results, a product scorecard, and discover an analysis of its resistance to evasion techniques, detection of SSL encryption, and more.

  • Strategy Guide for Securing the SAP Landscape

    Sponsored by: Onapsis

    Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.

  • What to Expect from a Multi-Factor Authentication Vendor

    Sponsored by: RSA Softcat

    This infographic shows you what you should expect from your multi-factor authentication vendor. Discover a strategy that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.

  • Benchmark Your Threat Detection Effectiveness

    Sponsored by: RSA

    This white paper describes the results of a global survey of 160 respondents across 22 different industry sectors in the Americas, EMEA and APJ from December 2015 through February 2016 to understand how effective organizations are at detecting and investigating cyber threats.

  • How to Pass a Security Audit in One Day

    Sponsored by: Above Security

    This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).

  • How to Avoid the Illusion of Your Corporate Network

    Sponsored by: Above Security

    This webinar helps you understand what your business and security intersection looks like and how your risk management abilities could improve moving forward. Learn the inextricable link between business and security and how to best integrate cyber security with business practices.

  • Cybersecurity Poverty Index

    Sponsored by: RSA Softcat

    Uncover the findings of The Cybersecurity Poverty Index, completed by 878 respondents across 81 countries. It provides a measure of the risk management and information security capabilities of the global population.

  • Advanced Persistent Threats and the Case for a Security Intelligence and Response Program

    Sponsored by: Above Security

    Get a general overview of advanced persistent threats (APTs) and who needs to be concerned about their malicious activities within this white paper. Access now to fully realize the benefit of security improvements, situational awareness, and a security intelligence lifecycle.

  • An Enterprise Security Program and Architecture to Support Business Drivers

    Sponsored by: Above Security

    This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.

  • Ransomware: The Identity of Attackers

    Sponsored by: OpenDNS

    Ransomware. It's everywhere, with thousands of infections daily, and unknown millions being made by unknown entities. This podcast looks at ransomware and how the cybercrime business operates.

  • Impactful Breaches in History: Ashley Madison

    Sponsored by: OpenDNS

    In this episode of Root Access, you'll take a look at the Ashley Madison breach, one of the most unique and impactful breaches in history. Uncover how it affected everyone on a personal level and the security details of how it occurred.

  • Why DDoS Prevention Appliances are So Important Today

    Sponsored by: Arbor Networks

    Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..

  • How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets

    Sponsored by: Schneider Electric

    This white paper details common distributed server room and remote wiring closet downtime incidents and poses recommendations for how monitoring and automations software integrated with video surveillance and sensors can reduce human error related downtime.

  • Five Essential Elements for an Effective Mobile Security Strategy

    Sponsored by: vmware airwatch

    End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.

  • Overcoming The Challenges Presented By Mobility In The Enterprise

    Sponsored by: IBM MaaS360

    This webinar shows you the granular management controls that you need working at the app and data levels. Learn how to leave the personal user experience unaffected while better securing corporate data.

  • Insider Threat Spotlight Report

    Sponsored by: Exabeam

    High profile security breaches underline the need for better security practices and solutions to reduce the risks posed by insiders. Read this research report from the LinkedIn Information Security Community to gain more insight into the state of insider threats and the solutions your peers plan to implement to prevent them.

  • ‘But I Was Compliant’

    Sponsored by: Armor

    Learn how to take a holistic approach to security and, in the process, easily meet regulatory requirements. Look beyond your checklist to ensure data security and the health of your organization.

  • The Definitive Guide to Data Loss Prevention Healthcare Edition

    Sponsored by: Digital Guardian

    This comprehensive guide provides what you need to understand, evaluate, and succeed with DLP in healthcare systems. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.

  • A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT

    Sponsored by: BitSight

    Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.

  • Webcast - Enhancing Enterprise Security in 2016 – Part 2

    Sponsored by: Intel

    Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.

  • Enhancing Enterprise Security in 2016

    Sponsored by: Intel

    In this informative webcast, Chris Young maps out a new model for cybersecurity, and shares what's currently underway. Learn how to get the most bang for your security buck and what role the government is playing in keeping your enterprise secure.

  • The Threat Defense Lifecycle — Why Traditional Security Fails

    Sponsored by: Intel Security

    Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.

  • The Threat Defense Lifecycle — Reducing the Time to Discover and Recover

    Sponsored by: Intel Security

    You need a new philosophy that'll reduce manual intervention, cut management complexity and optimize existing resources in order to reduce mitigation times. Discover an automated, analytics driven threat defense lifecycle that will give you the best opportunity for long-term, sustainable success in staying in front of security threats.

  • The Threat Defense Lifecycle: Intelligent Endpoint Threat Defense

    Sponsored by: Intel Security

    Adopt a threat defense lifecycle that will allow you to discover threats faster, respond quicker and overall outsmart attackers, driving business efficiency forward. Learn how to then apply these insights to an automated policy that can block similar attack attempts up front.

  • Seven Steps to Ease the Pain of Managing a SOC

    Sponsored by: Intel Security

    Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.