ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Building a Vendor (IT) Risk Management Program

    Sponsored by: BitSight

    Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.

  • Interoperability and the Cloud in Connected Health

    Sponsored by: CloudMine

    Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.

  • A letter from the CEO: Connected Health Cloud Release

    Sponsored by: CloudMine

    If you've been struggling to derive meaningful data insights yourself, now you can with a HIPAA-compliant cloud solution that won't break the bank.

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    Learn the essentials of formulating a mature information security program from this white paper, which will clarify the major points of contention surrounding the HITRUST Common Security Framework (CSF) Assurance Program. Access now to obtain answers to 20 FAQ to bolster the security posture of your healthcare organization.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    From this webcast arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • China-Based eCommerce Site Hits the Target in Fraud Detection and Sales Growth

    Sponsored by: CyberSource

    Discover how you can prevent fraud loss, and boost sales by enabling legitimate transactions. This short resource discusses how a China based eCommerce site Banggood fortified itself against fraud with a new unified platform.

  • Health Care Security Is Personal: Act Now to Protect Patient Care

    Sponsored by: Optum

    In this white paper, learn how health care organizations can successfully manage threats and vulnerabilities in this ever-evolving landscape. Inside, uncover how to identify, prioritize, prevent, and respond to new threats without impeding the flow of communications between patients, clinicians, admins, and 3rd party organizations.

  • Hackers Aren't As Picky As You Think

    Sponsored by: Verizon

    Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.

  • MetroDeal Securing Success, Managing Fraud

    Sponsored by: CyberSource

    Learn how one organization secured its site against a steadily growing level of fraud risk, and freed up staff time as an ancillary benefit.

  • DX.com Achieves Immediate Results in Fraud Control

    Sponsored by: CyberSource

    Discover how one China-based online electronics store was able to automate and streamline fraud management operations. Read on now and you'll also learn how to reduce your fraud rate and save thousands in fraud avoidance.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • Security Reference Blueprint for Industrial Control Systems

    Sponsored by: Palo Alto Networks

    Targeted attacks against national, critical infrastructure are a serious threat that must be addressed with the highest priority, given how these systems are responsible for controlling critical services. Learn ways to reduce operational risks, prevent system breaches, and become compliant with both government and internal governance.

  • Wireless Security Survey 2016

    Sponsored by: Fortinet, Inc.

    79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.

  • Defend Against the Undetected

    Sponsored by: Fortinet, Inc.

    This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

  • State of Trust Gap in 2015

    Sponsored by: MobileIron

    Discover important expectations and viewpoints employees have about their enterprise's privacy policies on personal data located on mobile devices. Uncover statistics and global highlights derived from the Trust Gap Survey data.

  • Enterprise Email and Office 365 Security

    Sponsored by: Check Point Software Technologies Ltd.

    One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Secure Enterprise Email on Mobile Devices

    Sponsored by: IBM

    Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • IBM Security QRadar Incident Forensics

    Sponsored by: IBM

    Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.

  • When to Adopt the Lift-and-Shift Cloud Migration Model

    Sponsored by: New Relic

    This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.