ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Data Defense Doesn't Win Championships

    Sponsored by: Delphix

    Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.

  • Data Management Platforms for GDPR: Buyer's Checklist

    Sponsored by: Delphix

    Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.

  • GDPR Requirements for Data Masking

    Sponsored by: Delphix

    This white paper takes a look a data masking – one of the many techniques businesses can take advantage of when getting ready for the GDPR. Learn more about what data masking is and find out how to improve protection for sensitive data.

  • DataOps for Data Privacy and Security

    Sponsored by: Delphix

    Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.

  • CW Europe – December 2017

    Sponsored by: ComputerWeekly.com

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

  • Security Analysis Principles and Techniques for IT Pros

    Sponsored by: SearchSecurity.com

    As a result of the recent developments affecting security analytics, uncover these tips for ensuring you get the most out of your security analytics tool.

  • The Tug of War Between UBA and SIEM

    Sponsored by: SearchSecurity.com

    In this issue of Information Security magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics. Additionally, our experts dive into Q&A with John Germain, CISO at Duck Creek Technologies and security research expert, Blaine Burnham.

  • Exploring Two New Ways of Getting Insight into the Cybersecurity Landscape

    Sponsored by: Juniper Networks, Inc.

    This e-guide sheds some light on 2 technologies changing the insight we have on our IT security infrastructures. First, explore how to evaluate the machine learning offerings in the cybersecurity market. Then find out what boons shared cloud security assessments can have on your organization.

  • 7 Steps To A Holistic Security Strategy

    Sponsored by: Microsoft

    In this e-book, learn how you can grow your security strategy to encompass today's far-reaching IT landscape in 7 easy steps.

  • Trends in Global Cybersecurity

    Sponsored by: Microsoft

    New transformations in the IT landscape have dramatically changed the way we're targeted by cybercriminals. Read this e-book to learn the top 10 trends in cybersecurity today.

  • Primer for Protection Against Cyberattacks: Business Email Compromise

    Sponsored by: TrendMicro

    In this primer, learn how business email compromise (BEC) attacks make inroads to businesses of all sizes. Then explore some strategies on how you can avoid becoming a victim of this scam.

  • Top 3 Challenges Your Team Faces when Building in the Cloud

    Sponsored by: TrendMicro

    In the pages ahead, delve into the 3 major challenges that security teams face when moving into the cloud so that you know how to avoid or overcome them on your path to cloud adoption.

  • The "Patient Zero" Problem and the Need for Modern Endpoint Protection

    Sponsored by: Palo Alto Networks

    The digital era requires the need for a modernized approach to endpoint protection. In this IDC research paper, learn how to address and overcome the latest network security challenges. Then, discover IDC's 5 fundamental rules for modern endpoint security.

  • How to Build a High Performance Secure Network

    Sponsored by: Aruba Networks

    Inside this resource learn how Aruba's UEBA tool, Introspect, helps detect attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses.

  • 10 Reasons Smart Power-Over-Ethernet Switches are the Wise Choice for Upgrading IP Surveillance Networks

    Sponsored by: D-Link

    In this white paper, uncover the top 10 reasons to upgrade to Smart (managed) PoE Switches for IP surveillance networks.

  • A Risk-Driven Identity And Access Management Process Framework

    Sponsored by: Microsoft

    This Forrester Research report outlines how to use behavior-based trending methods in your identity and access management strategy to reduce security exposures and improve the user experience.

  • Chrome OS: Secure from Bootup to Shutdown

    Sponsored by: Google Cloud

    As businesses create more data, it's becoming more important than ever to protect it. Watch this on-demand Google webinar to understand how Chrome OS is uniquely designed with best-in-class security at both the hardware and software levels.

  • App-ID Tech Brief: Traffic classification that identifies applications traversing your network

    Sponsored by: Palo Alto Networks

    In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.

  • Breach Detection Systems Test Report

    Sponsored by: TrendMicro

    In this breach detection report, discover the findings from an independent test of the Trend Micro Deep Discovery Inspector Model v3.8 SP5 and OfficeScan v12.0.1807 based on security effectiveness, network device performance and total cost of ownership.

  • Enterprise Mobility Roadmap

    Sponsored by: VMware

    Download this roadmap for 5 essential steps to future-proofing your mobility strategy. You'll learn how unified and cloud-based platforms, analytics and security infrastructures can drive visibility in device usage and policies to protect your organization – while allowing employees the flexibility they demand.

  • Servers, Servers, Everywhere: How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    With the vast shift to the cloud, securing workloads in multiple locations has become more complex than ever before. Access this white paper to gain valuable insights into the security challenges of the hybrid cloud and how you can overcome these challenges.

  • How To Become A Superstar Security Leader

    Sponsored by: Google Cloud

    As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.

  • What your Network Security Strategy Should Include

    Sponsored by: Aruba Networks

    IT pros strive to provide secure device-based network access control for employees, contractors and guests across any multivendor wired, wireless and VPN infrastructure. In this resource, discover the key features of Aruba's ClearPass to help build a stronger network security strategy for your organization.

  • What your Network Security Solution Should Include

    Sponsored by: Aruba Networks

    Learn what's needed to build a highly secure network that provides the control, visibility and reliability needed to deliver a secure computing experience from the edge, to the core, to the cloud.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.