ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Top 10 Data Security Tips to Safeguard Your Business

    Sponsored by: Absolute

    New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.

  • At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

    Sponsored by: Absolute

    Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.

  • 3 Types of Insider Threats to Watch Out For

    Sponsored by: Absolute

    Learn how to proactively spot an insider threat. This white paper gives you an overview of each insider threat profile so you can easily identify behavior and determine an appropriate response when faced with a potential insider threat.

  • How to Convince Your Board to Invest in AppSec

    Sponsored by: Veracode, Inc.

    Learn how to effectively express to your board why greater app layer security is paramount. See six solid arguments to bring up and discover how to get the most bang for your security buck.

  • Protecting the Distributed Enterprise

    Sponsored by: Fortinet, Inc.

    Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.

  • Accelerating Digital Transformation with Data-Driven Security (Video)

    Sponsored by: Akamai

    A new approach to cyber security is required to deal with bigger and badder threats. Discover how to take a data-lead approach to security. Learn how to increase your speed and accuracy when dealing with threats without sacrificing customer satisfaction through real-time threat intelligence.

  • Application Security Testing Vendor Evaluations

    Sponsored by: Veracode, Inc.

    This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.

  • Disaster recovery and business continuity: Essential guide

    Sponsored by: ComputerWeekly.com

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

  • DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)

    Sponsored by: Carbon Black

    Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.

  • Why Email Security Matters: The Advantages of Hosted Protection

    Sponsored by: LogicNow

    Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.

  • Benefits of Security Intelligence Services

    Sponsored by: Kaspersky Lab

    This white paper examines how the use of security intelligence services can help prepare your company's defenses so you can proactively mitigate threats from advanced attacks. Discover how to implement threat intelligence, leveraging data to track and manage risks before they have a negative impact on your organization.

  • Closing the Circle of Network Security Defense

    Sponsored by: Kaspersky Lab

    Explore how you can access comprehensive, trustworthy threat intelligence data so that you can defend against attacks before they're even launched. Uncover key features like accelerated incident response, threat hunting, and more.

  • IT Security 101: Thinking Like a Cybercriminal?

    Sponsored by: LogicNow

    Understanding how the threat landscape is maturing means getting to grips with how cybercriminals think. This e-book illustrates 6 key considerations for bolstering cybersecurity. Download it now to establish an effective system to proactively address potential threats across the entire cyber landscape.

  • Can One Enterprise Firewall Tool Protect Your Entire Network?

    Sponsored by: Fortinet, Inc.

    Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. Learn why one network security operating system could be all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.

  • The Eaton Power Management Guide

    Sponsored by: Eaton

    This white paper offers a five step guide to building a proper power management solution while optimizing your existing one. Engage in this intelligent power management strategy to fully reap the benefits of the existing modern IT architectures and avoid unforeseen risks.

  • Optimal Security for your Software-Defined Data Center

    Sponsored by: Kaspersky Lab

    Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. Learn about a security tool designed for virtualization platform technologies that barely impacts performance.

  • Intelligence Reporting: Answers to Your Security Questions

    Sponsored by: Kaspersky Lab

    This product overview highlights an advanced security intelligence reporting service that can provide answers to your crucial security questions. Learn how this service can reduce damage caused by advanced attacks by accessing now.

  • Information Security Policy Reference Guide

    Sponsored by: Navex Global

    This guide can help any organization struggling with data protection policies put solid guidelines in place for employees to follow. Uncover a definite structure for information security, access control and compliance among many other critical areas.

  • DDoS: A Clear and Present Danger

    Sponsored by: A10 Networks

    Discover eye-opening statistics detailing DDoS attacks and which industries are most in danger. Learn how to protect against an attack and the protection steps that make the most sense for your organization.

  • NSS Labs Data Center IPS Test Report: IBM XGS 7100

    Sponsored by: IBM

    This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.

  • Balancing Endpoint Security vs. End User Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. Industry expert Simon Townsend examines both sides of the issue and suggests approaches that will help you get and maintain that balance.

  • Balancing Endpoint Security vs. End User Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Balancing Endpoint Security vs. End User Productivity

    Sponsored by: AppSense

    Most IT organizations struggle to balance endpoint security and user productivity. In this webcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.

  • Reviewing a Year of Serious Data Breaches, Major Attacks and New Vulnerabilities

    Sponsored by: IBM

    Discover which industries were hit hardest in 2015 and what these attacks mean for the future. Learn what steps you can take to prepare your security plan for growing threats in 2016 and beyond.

  • Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel

    Sponsored by: Booz Allen Hamilton

    Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.