ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Preparing Your Business For Ransomware Attacks with a Backup and Recovery Strategy

    Sponsored by: Barracuda Networks

    This white paper explores an often overlooked line of defense against the ransomware threat: having a sound backup and disaster recovery plan in place. Learn how you can prep your organization to recover from a ransomware attack with a data protection strategy that offers speed, offsite replication, enhanced recovery performance, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How to Enhance Your Web Security with the Cloud

    Sponsored by: Trustwave

    Discover how to enhance your web protection, control and visibility from a cloud security platform. Uncover the benefits of allowing security experts to monitor security alerts and manage all policy updates so you can spend resources elsewhere.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.

  • Managed Security Services Provider – Evaluation Checklist

    Sponsored by: Trustwave

    Evaluate your next MSSP with this simple to use checklist. With it, you'll know important questions ask during the decision process and be able to compare two potential MSSP's against each other quickly and easily.

  • Ransomware and Phishing: How to Avoid Falling Victim to These Threats

    Sponsored by: Barracuda Networks

    Discover how to gain complete visibility, control and protection against malware, spyware, phishing, spear phishing and ransomware threats. Learn how to adequately secure all of your threat vectors and proactively stay ahead of the latest threats with an intelligent backend infrastructure.

  • DDoS Attacks Are On The Rise – And Fatal to Most Businesses

    Sponsored by: Arbor Networks

    This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.

  • 5 Ways to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: Barracuda Networks

    Discover how dire an issue phishing and ransomware has become, and learn how to mitigate them effectively. Through vulnerability analysis, threat intelligence, good backup processes and, most importantly, common sense, you can reduce your organization's risk of infection down to zero percent.

  • Why NGFWs Are Becoming the New Standard in Enterprise Security

    Sponsored by: Fortinet, Inc.

    The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.

  • Log Management and Automation for NIST Cyber Security Framework

    Sponsored by: LogRhythm, Inc.

    This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.

  • The Last Line of Defense Against the “Mega Breach”

    Sponsored by: CrowdStrike

    The frequency of "mega breaches" continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. Learn how breaches could be prevented by deploying endpoint protection technology.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • How GuideStar Stabilized Website Availability by Blocking Bad Bots

    Sponsored by: Distil Networks

    Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.

  • What are Threat Intelligence Services?

    Sponsored by: Unisys

    To help identify advanced attacks, a variety of vendors have created threat intelligence services. In this guide, you'll discover what threat intelligence services entail, learn how they work and uncover how these services differ. Determine whether these services can reduce the risk that specific types of threats pose to your enterprise.

  • 8 Tips to Stay Ahead of the Top 2016 Data Protection Trends

    Sponsored by: HDS and Veritas

    Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.

  • 4 Ways Neustar Strengthens your DNS Security

    Sponsored by: Neustar

    The once blue skies of cyber space have become the Wild West. Discover 4 steps you can take to protect DNS, lower business risk and defend your brand. Defend your organization against every new and existing malicious actor on the web to ensure customer safety and zero site downtime.

  • DNSSEC: How Savvy Attackers Are Using Our Defenses Against Us

    Sponsored by: Neustar

    Learn more about how hackers are using DNSSEC against you and get inside the anatomy of one of these attacks. Discover how to best defend against these attacks and allow legitimate traffic to flow through your websites.

  • How are Banks Fighting the War on Fraud

    Sponsored by: Neustar

    Discover how banks are fighting fraud, the amount of import they put on fraud and what they deem are the biggest impacts of fraud on their organization. Learn what to look for in an anti-fraud solution to balance security and customer convenience perfectly.

  • 2016 Security Operations Center Report

    Sponsored by: Neustar

    This report analyzes some of the major attack types seen in today's digital world and discusses trends for the future of cyber threats. You'll see statistics on DDoS attack vectors, attack volume and what sort of damage these attacks caused so you can best plan for the dangerous future of cybercrime.

  • 2016 Neustar DDoS Attacks & Protection Report

    Sponsored by: Neustar

    This report represents a global view of the DDoS outlook with insights and data from 6 continents and more than one thousand executives. Discover what the future holds for your organization and learn why security should be a central concern for all devices on your network.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • Nucleus Research Guidebook: Benefits of Cloud-Based SIEM

    Sponsored by: IBM

    In this Nucleus Research guidebook, learn how deploying a cloud-based security information and event management (SIEM) tool can help you achieve strong security while keeping costs down.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.