ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Shattering the Single Pane of Glass Management Model

    Sponsored by: JAMF

    82% of organizations use two or more enterprise mobility management solutions. There is no one-size-fits-all approach to device and OS management. Download this infographic to discover how you could benefit from managing by ecosystem, instead of a single pane of glass management model.

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • Mac Endpoints Move Into The Enterprise - and Into The Crosshairs of Hackers

    Sponsored by: Palo Alto Networks

    Mac computers used to be safe havens—impregnable bunkers—that attackers couldn't figure out how to get into...until now. The threat landscape for Macs is seeing rapid growth. Access this white paper to learn which method is working to prevent malware.

  • Taking Managed Services to the Next Level

    Sponsored by: Datto, Inc.

    As the threat landscape changes, security providers must also adapt. In this e-book, learn what it takes to protect against WannaCry and other new attacks, the answer to FAQs about lead generation, Ransomware growth broken down by the numbers, and more.

  • Insider Threats to Financial Services

    Sponsored by: Recorded Future

    More companies than ever before are seeking insider threat detection and prevention processes and tools. Read this white paper to uncover benefits from insider threat detection as well as prevention processes and tools.

  • Unified Endpoint Management: Security & Productivity for the Mobile Enterprise

    Sponsored by: Citrix

    In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.

  • The New Face of Cloud-Based Access management

    Sponsored by: Gemalto

    Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.

  • How to Bolster Endpoint Security Protection

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

  • Best Practices for Applying Threat Intelligence

    Sponsored by: Recorded Future

    Recent SC Media research reveals that 46% of security pros expect threat intelligence to be a very important part of their strategy. This white paper takes an in-depth look into threat intelligence, one of the most talked-about areas of information security.

  • Equinix Delivers Security Intelligence with Cloud-Based SIEM

    Sponsored by: Splunk

    Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.

  • 4 Steps to Cloud Access Management

    Sponsored by: Gemalto

    While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe a profitable.

  • Email Security Risk Assessment

    Sponsored by: Mimecast

    Mimecast tested 45 million emails to determine that nearly 11 million emails, or 24.2%, were "bad" or "likely bad." Discover how an email security risk assessment can improve email protection across its users.

  • Remediation and Mitigation for Windows Active Directory Security

    Sponsored by: Quest

    Discover key steps to follow when adapting to the changes found in Active Directory using remediation and mitigation.

  • Customers Showcase Security Success

    Sponsored by: Splunk

    Data security is vital for companies in protecting sensitive business and customer data. Read this e-book to uncover 15 customer success stories and learn more about analytics-driven security and how to maintain an uninterrupted business.

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • What is Next-Generation Antivirus, or NGAV?

    Sponsored by: Carbon Black

    Next Generation Antivirus (NGAV) prevents cyberattacks on a large spectrum and provides more coverage with less resource requirements. Learn more about NGAV in this webcast.

  • Protecting the Hybrid Cloud from Advanced Threats

    Sponsored by: TrendMicro

    With over $1 billion in revenue attributable to ransomware in 2016, many new ransomware families are designed to target servers, including web servers, file servers, virtual desktops, and even specific business critical file types. Discover how to secure today's servers, whether they're physical, virtual, or cloud-based.

  • Don't Overlook Email When Planning for GDPR Compliance

    Sponsored by: Mimecast

    With the GDPR deadline less than a year away, businesses need to focus on their most critical applications, email. Uncover best practices and how to mitigate GDPR risk for email.

  • 5 Essential Approaches to Securing your WordPress Site

    Sponsored by: Liquid Web

    As a result of WordPress's popularity, it has become an incredibly high-profile target. Discover how to make WordPress sites harder to target by hackers with 5 essential approaches.

  • Automated, Real-time Risk Analysis and Remediation

    Sponsored by: FireMon

    Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Ransomware: Defending Against 5 Major Types

    Sponsored by: Commvault

    Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.

  • Cybersecurity Readiness: 2017 Survey Results

    Sponsored by: Solarwinds MSP

    Survey results suggest that IT providers are confident of their cybersecurity preparedness. But is this confidence misplaced? Learn the results in the report and uncover why overconfidence may be leading to more data security breaches.

  • The Need for Rapid Security Investigation

    Sponsored by: Splunk

    Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.