ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Extend Security and Control from the Data Center Edge to the Core

    Sponsored by: VMware

    The average total cost of a data breach for companies increased 23 percent on a year-over-year basis to a whopping $3.79 million in 2015. Micro-segmentation allows your security team to focus on the problem areas and minimize resource usage. Access this eBook to learn more about this technology and better secure your data.

  • Discovering Security Analytics Use Cases

    Sponsored by: Prelert

    In this resource, discover how to tailor your security analytics to detect certain behaviors associated with threats advancing on your organization. Select each threat indicator to examine its particular attack progression stages for data exfiltration activity, compromised endpoints, and more.

  • Control and Secure Sensitive Data

    Sponsored by: Citrix

    Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.

  • ELIMINATING CYBERSECURITY BLIND SPOTS WITH APPLICATION AWARENESS

    Sponsored by: Ipoque

    This webinar will review the hidden cyber security threats that Service Provides and Enterprises need to combat.

  • Customer Story: Kuwait Petroleum Corporation

    Sponsored by: Citrix

    Data sharing is a necessity in any business. The problem is ensuring security, control and visibility over what is being shared. Access this case study to see how one company was able to implement a follow-me data solution that provided secure, compliant data sharing and business continuity across the enterprise.

  • Ensuring Document Security Across Any Device

    Sponsored by: BlackBerry

    Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.

  • Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs

    Sponsored by: Dell, Inc., Intel and VMware

    As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.

  • Brasfield and Gorrie builds productivity and security with paperless collaboration

    Sponsored by: Citrix

    Mobility is becoming the business norm and requirement from employees. This resource highlights a solution that allows employees to collaborate, share files and data remotely without hindering security or taking visibility and control from IT.

  • The Workstation Monitoring Imperative

    Sponsored by: Intersect Alliance

    This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.

  • For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud

    Sponsored by: AT&T

    As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.

  • FortinetCSO_QP

    Sponsored by: Fortinet, Inc.

    This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.

  • Protecting_Against_APTs_minibook

    Sponsored by: Fortinet, Inc.

    This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.

  • Cybersecurity and Data Theft Prevention

    Sponsored by: Forcepoint

    This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.

  • University of Texas at Austin Ensures Network Security for its Distributed Campus

    Sponsored by: Splunk

    Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.

  • IDC-Analyst-Connection-ISFW

    Sponsored by: Fortinet, Inc.

    This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.

  • SG-ISFW-Fortinet

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.

  • Build A High-Performance, Customer-Obsessed Security Organization

    Sponsored by: AllClear ID

    This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.

  • The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails

    Sponsored by: Proofpoint, Inc.

    In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.

  • Get Ahead of Threats

    Sponsored by: Fortinet, Inc.

    This e-book is a collection of 24 essays on a broad array of network security topics. It also introduces a firewall system that covers your enterprise, end-to-end.

  • Managing Critical Security Controls

    Sponsored by: Splunk

    In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.

  • Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.

  • Communications Security: A Blueprint for Enterprise Session Border Controller Deployments

    Sponsored by: Oracle Corporation

    Review the common security issues with collaboration technology and learn how UC-specific security, in concert with traditional security tools, can safeguard your data.

  • Fraud Protection Doesn't Have to Be an Uphill Battle

    Sponsored by: IBM

    Access this white paper and find out how you can reduce the time and cost of fraud protection while helping make your customers' transactions safer. Learn about highly effective intelligence and evidence-based fraud detection with fewer false positive.

  • Advanced security from the inside with VMware NSX

    Sponsored by: VMware

    This white paper shows you a new way to implement data center security that constantly monitors threats while you're away. Now fine-grained threat isolation, segmentation and centralized control are all possible inside your data center. Access now to learn how you can gain fully streamlined operations and centralized control today.

  • Executive_Summary_DefendAgainstTheUndetected

    Sponsored by: Fortinet, Inc.

    This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.