ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • Security Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • The SIEM Essentials to Creating Your Own Security Posture

    Sponsored by: Splunk

    Watch this webcast to learn how one of the United States' biggest nuclear research firms puts this SIEM software to work as part of their security posture. Go inside to learn how, by implementing this program, you too can get customizable incident reporting, real time account activity dashboards, and more.

  • The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack. Then discover a modern protection tool that can do what traditional security programs can't.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • Managed Security Service Provider Selection for Dummies

    Sponsored by: Rackspace

    In this book, you learn how to leverage a managed security services provider to enhance your organization's security posture in the cloud.

  • A Day in the Life of a GDPR Breach

    Sponsored by: Splunk

    This webcast outlines what the GDPR entails, as well as outlines a basic guide for what will happen, and what you should do to mitigate the damage done by a GDPR breach.

  • 6 Steps for Building a Robust Incident Response Function

    Sponsored by: IBM Resilient

    42% of cyber security professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume, according to Enterprise Strategy Group. This white paper discloses 6 steps for building a robust incident response function to ensure your organization keep up with the high security alert volume.

  • Endpoint Security - Market Quadrant 2016

    Sponsored by: Symantec & Blue Coat Systems

    By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.

  • IT Asset Management for Compliance

    Sponsored by: Oomnitza

    Most C-level professionals, through no fault of their own, cannot answer questions about their organization's assets and have no way to find the relevant information. Access this white paper to learn about an asset management platform that addresses these problems.

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.

  • Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR

    Sponsored by: SearchSecurity.com

    In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.

  • Security Analytics

    Sponsored by: ComputerWeekly.com

    This e-guide focuses on how businesses are turning to emerging technologies to improve their capability to detect and respond to previously-unknow cyber-attacks, and security analytics is among the most popular choices.

  • Protecting Data After the Digital Disruption

    Sponsored by: Proofpoint, Inc.

    Data is no longer stored in one location and companies are running into challenges related to securing sensitive data. Watch this webcast to uncover key challenges driving DLP as well as stages of DLP maturity, considerations for your DLP strategy, and more.

  • Stop Malware Cold, Before it can Do Any Damage

    Sponsored by: Dell India

    Click inside this infographic to discover why prevention – not reaction – is the best way to fight back against the growing malware threat.

  • How are you protecting data from insider threats?

    Sponsored by: Dell India

    In this infographic learn how insider data thefts happen, who's responsible for preventing them, and steps you can take to mitigate the frequency of these thefts.

  • Comprehensive Mobile-Cloud Enterprise Security

    Sponsored by: MobileIron

    Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell India

    65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity?

  • The Human Side of IT Security

    Sponsored by: Dell India

    Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".

  • 2017 Cyberattack Trends

    Sponsored by: Check Point Software Technologies Ltd.

    This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.

  • Making a DDoS Protection Plan: 8 Best Practices

    Sponsored by: Akamai Technologies

    Having a DDoS protection plan in place is all it takes to stave off the panic when an attack hits, and help you return to business as usual. Inside, learn 8 steps you can take to put this plan in place.

  • Strategies for API Security

    Sponsored by: Akamai Technologies

    This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Your Business Apps are Under Attack: Are you really Protected?

    Sponsored by: Alert Logic

    Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.

  • Expert Perspectives on Data Protection and GDPR Compliance

    Sponsored by: CyberArk Software, Inc

    A report from World Economic Forum and McKinsey & Company estimates that cyberattacks could cost the global economy $3 trillion by 2020. Read this e-guide to reveal experts' perspectives on data protection, cybersecurity, and compliance.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.