ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Video Beyond the Boardroom: 4 Steps to Improving Call Quality

    Sponsored by: Vyopta

    Does your organization enjoy the benefits of video conferencing and video collaboration? With increased use of these resources, your IT team probably has a much bigger challenge of managing mobile devices. This eBook reviews the fundamentals of new video conferencing call quality metrics.

  • Managing the Madness of Mobility

    Sponsored by: Sprint

    For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.

  • Are You Doing All You Can to Protect Your Critical Business Information?

    Sponsored by: Citrix

    This resource discusses how you can move on from your outdated strategies and adopt security designed for today's threats.

  • Enterprise Mobility Strategies: Steps to Success

    Sponsored by: Data#3

    With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.

  • 5 Best Practices to Make Security Everyone's Business

    Sponsored by: Citrix

    This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.

  • Safeguarding Data and the Mobile Enterprise

    Sponsored by: IBM

    As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.

  • The 10 Keys to Seeing 20/20 on Your EMM Vision

    Sponsored by: Accelerite

    Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.

  • Make Your Security Proactive, Not Reactive

    Sponsored by: CrowdStrike

    This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.

  • App Refactoring: How to Extend Application Virtualization

    Sponsored by: StarMobile

    In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.

  • 3 Strategies to Manage Compliance Mandates

    Sponsored by: Citrix

    This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.

  • Cyber Attack Survival Checklist

    Sponsored by: CrowdStrike

    This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.

  • Today's State of Mobile App Security

    Sponsored by: IBM

    Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.

  • Securing Information in the New Digital Economy

    Sponsored by: Oracle Corporation

    This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.

  • 4 Secrets to Security: Engaging a Meaningful Dialogue

    Sponsored by: Citrix

    Board meetings can be an opportunity to engage your company's most senior leaders in a strategic dialogue not only about security, but about mobility, cloud computing, and the evolution of the workplace. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.

  • Maximizing Your Video Utilization: The Best Practices

    Sponsored by: Vyopta

    In order to ensure maximum return on investment for your video collaboration, taking advantage of new desktop and mobile software that make it possible to deliver high-quality video experience is crucial. This white paper highlights some of the best practices for maximizing enterprise video utilization.

  • Virtual Server Protection: A Buyer's Checklist

    Sponsored by: Commvault

    In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.

  • Mobilize Your Email with Enterprise-Grade Security and Data Protection

    Sponsored by: Citrix

    This white paper explains how to mobilize your email with enterprise-grade security that can increase productivity, while giving IT the flexibility to meet the unique requirements of different use cases and data types.

  • 10 Vital Questions for Evaluating Your Mobile Security Strategy

    Sponsored by: Citrix

    Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.

  • Defend Your Backend Mobile Web Properties

    Sponsored by: Citrix

    In this white paper, you'll learn how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the network and backend components of your web solutions.

  • A Powerful Defense Against Denial of Service Attacks

    Sponsored by: Citrix

    This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.

  • 10 Essential Elements for Secure EMM

    Sponsored by: Citrix

    This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.

  • Web Security Threat Report 2015

    Sponsored by: Symantec

    By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.

  • One Secure Credential for Logical, Physical, Local, and Remote Access

    Sponsored by: HID

    This white paper explores how two-factor authentication (2FA) protects your organization from these network breaches and mitigates credential theft risks.

  • Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit

    Sponsored by: SurfWatch Labs

    This report uses data from recent financial sector attacks to discuss trends in financial sector security.

  • Cyber Risk Report: Data Breaches and the Healthcare Industry

    Sponsored by: SurfWatch Labs

    This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.