ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Best Practices Research

  • George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture

    Sponsored by: Gigamon

    Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.

  • Move Your Email to the Cloud with Confidence

    Sponsored by: Mimecast

    As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.

  • Staying Ahead of Emerging Threats in Healthcare

    Sponsored by: Symantec Corporation

    To attain a strategic level of security in your healthcare organization, there's technology changes as well as cultural changes you must make to be up to par with other industries. This video gives you expert insight from the latest study on healthcare IT security risk management.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • Protecting Valuable Data Assets

    Sponsored by: Intel Security

    Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • SB-Secure-Access-for-Retail

    Sponsored by: Fortinet, Inc.

    When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Complete Data Protection

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • When Visibility is not Enough: Taking Control of Your Data

    Sponsored by: Intel Security

    In order to stop data breaches, organizations need to have full visibility into where their data is going. Learn how to stop critical data from leaving your enterprise and educate end-users who have lapsed into bad practices.

  • Addressing Cybersecurity in Healthcare Strategically

    Sponsored by: Symantec Corporation

    What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • Making the Case for SMB Security Services

    Sponsored by: CDW

    In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch out for. Learn how SMBs can create a strong security strategy to prevent and mitigate attacks.

  • Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

    Sponsored by: IBM MaaS360

    Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.

  • Protect Patient Data with Strong Desktop Security

    Sponsored by: Aventura

    Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • When Business is the App, The App is the Business - Vol 1

    Sponsored by: IBM MaaS360

    Businesses need to be much more mindful about safe productivity. Learn how to safely distribute and manage mobile apps, on both BYOD and COPE devices, that are critical to employee productivity and smooth business operations.

  • Office 365 single sign-on augurs complexity, setup hitches

    Sponsored by: Symantec Corporation

    Could Office 365 be the perfect scenario for SSO or riddled with issues down the line? Get more insight on the impact to mobile device management and BYOD inside.

  • Take Office 365 data security from the cloud into your own hands

    Sponsored by: Symantec Corporation

    This e-guide shows you four key security factors you must consider before you migrate into the cloud. Learn how to properly encrypt and backup sensitive information, without the risk of data leakage or breaches.

  • IDC: Protecting Your SaaS Applications

    Sponsored by: TrendMicro

    Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.

  • Hulu Solves Their Security Analytics Problems with Exabeam

    Sponsored by: Exabeam

    Hulu security decided to utilize user behavior analytics (UBA) to help with this process. They're now able to focus their small team on specific areas of concern rather than watch a whole gamut of areas.

  • Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution

    Sponsored by: Exabeam

    User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • Security Operations Centers: The Key to the Future

    Sponsored by: Intel

    Security operations centers (SOCs) can help enterprises gain better visibility into their environments. In this resource, expert Eric Cole explains how to get the most out of SOCs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.