ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • China-Based eCommerce Site Hits the Target in Fraud Detection and Sales Growth

    Sponsored by: CyberSource

    Discover how you can prevent fraud loss, and boost sales by enabling legitimate transactions. This short resource discusses how a China based eCommerce site Banggood fortified itself against fraud with a new unified platform.

  • Health Care Security Is Personal: Act Now to Protect Patient Care

    Sponsored by: Optum

    In this white paper, learn how health care organizations can successfully manage threats and vulnerabilities in this ever-evolving landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.

  • The Top Five Requirements for Secure Enterprise File Sync and Sharing

    Sponsored by: Citrix

    Making sure you can provide secure I.T. oversight is the first step in considering a file sync and share solution for your organization. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for next-generation workspaces.

  • Rethinking the cyber security disconnect

    Sponsored by: VMware

    Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • IBM Security Trusteer Pinpoint Detect Solution Brief

    Sponsored by: IBM

    You need a fundamentally different approach to detecting fraud that will also decrease false positives. Discover how to build fraud detection based on visibility, global threat intelligence and agility. Simplify your approach and accurately identify fraud throughout the entire fraud lifecycle.

  • Analyze This

    Sponsored by: SAS

    See how other organizations define security analytics and why you should consider its implementation to better optimize your organization. Learn how you can assess security performance to make better spending and policy decisions.

  • IBM Security Trusteer Fraud Protection Suite solution brief

    Sponsored by: IBM

    Discover more accurate fraud detection and gain greater visibility and adaptability across the fraud management lifecycle.

  • Re-Thinking Your Data Flow Transmission for Security Risk and Compliance

    Sponsored by: Axway

    A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.

  • Addressing the Problem of Business Email Compromise

    Sponsored by: Cloudmark

    Using recent examples, Cloudmark's VP of Product Management, Kevin San Diego and Gartner Research Director Perry Carpenter will tell you how to prevent future spear phishing attacks and what capabilities a spear phishing solution needs to include in order to be effective.

  • State of Trust Gap in 2015

    Sponsored by: MobileIron

    Discover important expectations and viewpoints employees have about their enterprise's privacy policies on personal data located on mobile devices. Uncover statistics derived from the Trust Gap Survey who polled mobile workers in France, Germany, Japan, Spain, the UK, and the US.

  • The Future of Endpoint Protection

    Sponsored by: Atos

    Discover how to best secure your endpoints against today's hostile threat environment. Learn how secure operations, secure technology and secure applications to protect corporate data against physical or digital theft.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Stop Ransomware with Carbon Black

    Sponsored by: Carbon Black

    Re-imaging security methods will never be the right solution to this problem. Learn about the tools imperative in preventing, detecting and remidiating randsomeware threats to your endpoints. Get greater visibility through continuous monitoring throughout your whole network.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Uniting the Security Community and Shifting the Economic Balance of Cyber Defense

    Sponsored by: Carbon Black

    The security industry cannot continue to perpetuate the idea that technology alone will solve our security problems. Learn how to share attack details with colleagues outside of your own organization to benefit the entire cybersecurity community.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Secure Enterprise Email on Mobile Devices

    Sponsored by: IBM

    Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • Cybersecurity Predictions for 2016

    Sponsored by: Global Knowledge

    Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.

  • Mobile Application Security Report 2016

    Sponsored by: Hewlett Packard Enterprise

    Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.

  • BYOD Mobile Device Management

    Sponsored by: IBM

    Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.

  • When to Adopt the Lift-and-Shift Cloud Migration Model

    Sponsored by: New Relic

    This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.