ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • 10 Real-Time Reporting Strategies for Better Security and Compliance

    Sponsored by: Dell Software

    With real-time auditing tools, you can immediately uncover what's happening in your environment. Learn about 10 reports designed to help you track changes in real-time, receive alerts about critical changes, and more.

  • Your Quick Reference Guide to Always-On SSL

    Sponsored by: Symantec

    Learn in quick and easy bullet points and infographics what Always-On SSL is, why it works, and what it can do for your organization.

  • Your MSSP Decision Guide

    Sponsored by: Trustwave

    Discover key questions and considerations to help you select an MSSP and evaluate their solutions to better secure your business. Access now to find how much global reach your MSSP should have, what it means to have security expertise, and more.

  • How a CASB with Built-In UBA Unmasks Insider Threats in the Cloud

    Sponsored by: Palerra Inc.

    Uncover a better approach to dealing with a user with valid credentials, but malicious intent. Learn how the focus of most enterprise security teams is misaligned towards outside threats, how the network perimeter has been corroded, and what can truly be done about an data breach caused by an insider.

  • Addressing Mobile App Risk: Why Network Traffic Analysis Isn't Enough

    Sponsored by: Appthority

    Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.

  • Top 5 SSL Attack Vectors

    Sponsored by: Symantec

    Discover not only the basics of SSL vulnerabilities, but what your enterprise can do to avoid the top 5 hazards that so many organizations fall prey to when deploying encryption.

  • Not All Certificate Authorities are Created Equal

    Sponsored by: Symantec

    Learn the importance of continual hardening of the infrastructure that protects cryptographic keys and securing the authentication process that validates identity. Uncover how to maximize SSL encryption effectiveness, utilize daily penetration testing, and create a secure certificate authorities environment.

  • WEBSITE SECURITY THREAT REPORT 2016

    Sponsored by: Symantec

    Discover what can be done to steel a website to malware and data breach attacks with comprehensive website security. Also uncover a breakdown of notable security events in 2015, and analyze key takeaways from real attacks on systems just like yours.

  • Designing a Multilayered, In-Depth Defense Approach to Authentication

    Sponsored by: Dell Software

    This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.

  • Streamlining Security Incident and Vulnerability Response

    Sponsored by: ServiceNow

    Discover vital shortcomings in the way IT defends itself from incidents and breaches, and how to shore up your own defenses. Learn how to integrate security and IT tools while coordinating incident response, reducing time-until-response, and remediate issues quickly.

  • Focus: Securing new technology

    Sponsored by: ComputerWeekly.com

    The scarcity of information security professionals with the required depth and breadth of experience is one of the biggest challenges facing businesses. As businesses seek to gain competitive edge through digital transformation, they are increasingly exposing themselves to increasing risk of cyber attack.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • To Increase Downloads, First Instill Trust: Security Advantages of Code Signing

    Sponsored by: Symantec

    Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.

  • How Status Quo Creates Security Risk - The State of Incident Response

    Sponsored by: ServiceNow

    Learn what was found after the current practices and challenges associated with incident response processes and technologies are evaluated from thousands of respondents all over North America.

  • Simple Steps to Evolving Your Website Security in 2016

    Sponsored by: Symantec

    Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

  • Aruba Clear Pass Policy Management Platform

    Sponsored by: Aruba Networks

    Learn how Adaptive Trust allows IT to make smarter decisions about who (and what) can connect to the network.

  • Understanding Shared Responsibility for Microsoft Azure

    Sponsored by: Alert Logic

    Discover your enterprise's relationship with Azure for IaaS, PaaS, and both Microsoft's and Azure's Active directories. Also learn 7 Azure best practices.

  • Why Code Signing Is an Essential Website Security Feature

    Sponsored by: Symantec

    Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.

  • It’s Not You, It’s Me: Understanding the Shared Responsibility of Cloud Security

    Sponsored by: Alert Logic

    Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.

  • Answering 10 Essential Questions About Website Security

    Sponsored by: Symantec

    Even though SSL/TLS certificates and vulnerability scans are a crucial part of website security, they're no longer enough. Are you going beyond the basics? Read on to ascertain the strengths and weaknesses of your current website security strategy by asking yourself 10 crucial questions.

  • Insider Threat Spotlight Report

    Sponsored by: Dell Software

    The increase in insider data theft highlights the need for better security practices. In fact, 40% of organizations don't even have the ability to detect insider threats. Access this spotlight report on insider threats to uncover more key trends that demonstrate the magnitude of this risk, and what you can do to prevent it.

  • Cyber Attackers Follow Companies into the Cloud

    Sponsored by: Alert Logic

    Learn the trends of cloud security, what the data from over 80,000 security incidents have taught, and what the future might hold for safeguarding your data in the cloud.

  • Protected to Innovate: Securing Your Hybrid Cloud

    Sponsored by: Hewlett Packard Enterprise

    Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.

  • Critical Security and Compliance Considerations for Hybrid Cloud Deployments

    Sponsored by: Hewlett Packard Enterprise

    Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.

  • How to Protect Data from Ransomware

    Sponsored by: Dell Software

    It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.