ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Magic Quadrant for Security Information and Event Management

    Sponsored by: LogRhythm, Inc.

    Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. This Gartner report reveals strengths and cautions of different vendor's security information and event management products as well as a market overview.

  • DataOps for Data Privacy and Security

    Sponsored by: Delphix

    Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • The Tug of War Between UBA and SIEM

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • 7 Steps To A Holistic Security Strategy

    Sponsored by: Microsoft

    In this e-book, learn how you can grow your security strategy to encompass today's far-reaching IT landscape in 7 easy steps.

  • Trends in Global Cybersecurity

    Sponsored by: Microsoft

    New transformations in the IT landscape have dramatically changed the way we're targeted by cybercriminals. Read this e-book to learn the top 10 trends in cybersecurity today.

  • Top 3 Challenges Your Team Faces when Building in the Cloud

    Sponsored by: TrendMicro

    In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.

  • The "Patient Zero" Problem and the Need for Modern Endpoint Protection

    Sponsored by: Palo Alto Networks

    The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.

  • How to Build a High Performance Secure Network

    Sponsored by: Aruba Networks

    Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.

  • How To Become A Superstar Security Leader

    Sponsored by: Google Cloud

    As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.

  • What your Network Security Solution Should Include

    Sponsored by: Aruba Networks

    Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • Vendor Landscape: Cloud Workload Security Solutions

    Sponsored by: Alert Logic

    In this Forrester Research report, gain valuable insights about cloud workload security (CWS) solutions, criteria selection and key vendor differentiation.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • Web security: Important but often overlooked

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

  • Data + Security = A Most Unvirtuous Relationship

    Sponsored by: Delphix

    Learn about the emergence of DataOps as well as how different data security methodologies and tools are changing to handle modern threats to growing volumes of data and personal information.

  • Hyland Ensures Growth with High-Performance, Intelligent Network Security

    Sponsored by: Juniper Networks, Inc.

    In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.

  • Delivering Fortinet Security to AWS GovCloud Customers

    Sponsored by: AWS - Fortinet

    In this resource, uncover the 6 virtual security products optimized for AWS to help your organization with a secure and future-proof transition to a cloud environment.

  • Amazon Web Services: Automatically Scale Cloud Security

    Sponsored by: AWS - Fortinet

    This white paper explores how Fortinet helps deliver seamless integration with Amazon Elastic Compute Cloud and Amazon Virtual Private Cloud to minimize risk and mitigate security treats for workloads running on the cloud. Then, find out how your organization can deploy and automate cloud security with auto scaling.

  • Discover how BorrowersFirst chose their colocation provider

    Sponsored by: Peak10

    In this case study, learn why the online lending company BorrowsFirst chose Peak 10 + ViaWest as their colocation provider. Click inside to learn what they gained like quick and simple deployment, simplified compliance management, and more.

  • Using AI, Machine Learning and Other Advanced Technologies to Stay Ahead of Cybercrime

    Sponsored by: Juniper Networks, Inc.

    In this study, research specialist Vanson Bourne interviewed 400 IT and security professionals to learn how they're putting new technologies like AI and machine learning to strengthen existing security procedures.

  • 3-Fold Approach and Best Practices to Cyber Security

    Sponsored by: Citrix

    71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.

  • Security Automation and Orchestration Best Practices

    Sponsored by: ServiceNow

    According to a recent Forrester Research Survey, 68% of respondents state that using automation and orchestration tools to improve security operations is a high or critical priority. Watch this webcast to gain insight into security automation and orchestration (SAO) best practices and a roadmap for deployment.

  • The Complete Guide to Building a Security Culture

    Sponsored by: Trustwave

    IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.