ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Defense-In-Depth with Internal Segmentation Firewalls

    Sponsored by: Fortinet, Inc.

    Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.

  • 7 Steps to Take Charge of Your Cloud Strategy

    Sponsored by: Blue Coat Systems

    Discover 7 actions that IT departments can do to take back their organizations from shadow IT and ensure they are not leaving themselves vulnerable to attack. Access now to gain a blow-by-blow plan to take charge of your enterprise's cloud strategy and not let shadow IT slip through the cracks.

  • IT Decision Maker's Cybersecurity Survey 2016

    Sponsored by: Fortinet, Inc.

    This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.

  • Security Analytics Brings Data-Driven Security Into The 21st Century

    Sponsored by: FireMon

    With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. Learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.

  • Firewall Clean Up Recommendations

    Sponsored by: FireMon

    Discover the benefits of proper firewall policy for your organization. Learn the main causes of firewall policy mistakes, which include excessive access, ineffective change management, lack of aging strategy, etc., and how to clean up your current firewall management processes.

  • Innovation for the Cloud Generation: Blue Coat Answers Your Top 6 Questions for 2016

    Sponsored by: Blue Coat Systems

    6 of your top cloud security concerns will be laid to rest as the era of the cloud generation comes to fruition. Learn how to handle compliance, shadow IT, secure your data against advanced threats, and more.

  • Analyzing the Top 8 Indicators of Threat Traffic

    Sponsored by: LogRhythm, Inc.

    While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic.

  • Quantifying the Value of Firewall Management

    Sponsored by: FireMon

    Learn how to reduce the total annualized business impact of managing firewalls without reducing the protection afforded by them. Access now to discover detailed models breaking down the costs and effectiveness of network firewalls, as well as upkeep, realistic examples of their use, and more.

  • An MSP Guide to Selling IT Security

    Sponsored by: LogicNow

    Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: LogicNow

    Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.

  • How Multi-Vendor DNS Can Protect Your Internet Presence

    Sponsored by: Dyn

    This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.

  • Ransomware: Mitigating the Threat

    Sponsored by: Zerto

    Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Cloud IAM - TCO

    Sponsored by: IBM

    Learn how to stop the monotony of IAM, and instead turn it into a business enabler. By adding enterprise-grade identity-as-a-service (IDaaS), you'll be able to reduce costs by 60%, onboard SaaS apps 100 times faster and generate powerful access management from a single screen.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about on your next enterprise grade IDaaS provider with this buyer's guide.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.

  • Container Security: How to Secure Enterprise Container Stacks

    Sponsored by: NeuVector

    Learn the basics of container security and how to best secure your container stacks. Discover tools available to plug potential security holes and strategies to keep your organization secure.

  • The Hidden Costs of Microsoft Office 365 Security

    Sponsored by: Proofpoint, Inc.

    Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security. Discover what lessons its limitations will teach you, such as: siloed security is not sustainable, fragmented data loss prevention decreases your chance of success, archiving must be defensible and e-discovery ready, and more.

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • A Powerful Next-Gen Antivirus Solution

    Sponsored by: Carbon Black

    Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.

  • Three Golden Rules for Safe and Sound Endpoints

    Sponsored by: IBM

    Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.

  • Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs

    Sponsored by: IBM

    Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one.

  • The Cyber Threat Guide

    Sponsored by: LogicNow

    This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them.

  • Case Study: How H-E-B Took the Reins of its Email Security

    Sponsored by: Proofpoint, Inc.

    In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.