ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Management Research

  • Move Your Email to the Cloud with Confidence

    Sponsored by: Mimecast

    As Office 365 adoption grows, Microsoft and all of its customers become a more appealing target. Explore the top five reasons you need a "Plan B" when it comes to securing Office 365.

  • Top 10 Security Priorities For US Healthcare Organizations

    Sponsored by: Absolute

    This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.

  • What's Driving the State of Cybersecurity

    Sponsored by: Unisys

    The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.

  • Help Your Security Team Sleep at Night

    Sponsored by: Riverbed Technology, Inc.

    This resource explores a platform that combines the packet, flow, application, infrastructure, and transaction data required to understand past security events. Uncover ways to make the right choices to strengthen and monitor cyber defenses.

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Wireless Defense Strategies in the IoT Era

    Sponsored by: Fortinet, Inc.

    Reevaluate access layer protection in enterprise WLANs and why deploying ad-hoc security is no longer enough to protect against threats. You'll also see why a secure access architecture will be required to survive the data threats of the future.

  • Making the Case for SMB Security Services

    Sponsored by: CDW

    In this exclusive e-guide, Associate Editor Spencer Smith looks into the 3 main types of cyberthreats SMBs need to watch out for. Learn how SMBs can create a strong security strategy to prevent and mitigate attacks.

  • Protect Patient Data with Strong Desktop Security

    Sponsored by: Aventura

    Learn how to build a security wall around PHI by addressing desktop security vulnerabilities. Unveil 7 ways to strengthen desktop security and access management in order to keep patient data safe.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • What Are the Best Ways to Improve SMB Security?

    Sponsored by: CDW

    Expert Mike O. Villegas advises SMBs on security defenses. Uncover control measures to improve security, such as: defining data breach notification requirements, using firewalls, antivirus software, and up-to-date patches, and more.

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

  • 10 Characteristics of a HIPAA-Compliant ePHI Application

    Sponsored by: Coalfire

    The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.

  • SDN network security: Building a safer architecture

    Sponsored by: VMware

    As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Software-defined networking (SDN) technology enables networks to better secure themselves and provide capabilities to enhance the network's ability to identify and remediate cyberattacks.

  • Read this before attempting network microsegmentation

    Sponsored by: VMware

    Microsegmentation is emerging as an essential networking, data center and security tool, but it's a difficult tool to master. This expert guide reveals the technology's benefits and disadvantages, considerations to take into account during the adoption process and what kind of services vendors are offering.

  • Enterprise Security Innovation on the AWS Cloud

    Sponsored by: Unisys

    One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.

  • Cloud Security: Advanced, Efficient, and Trusted

    Sponsored by: Unisys

    Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.

  • How One Security Expert is Exploring Modern Threats to Enterprises

    Sponsored by: Check Point Software Technologies Ltd.

    Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.

  • Governing the Complications of Social Media Security and Compliance

    Sponsored by: Actiance

    In this exclusive e-guide, technology law expert Jeffrey Ritter discusses the obstacles of governing social media security in 21st century business and what you can do to protect sensitive company information.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • E-Waste Is More Than Just Clutter – It’s A Security Issue

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Why IT Leaders Are Buying into Mobile Security

    Sponsored by: Lookout

    As mobile devices continue to play a major role in productivity, the likelihood for targeted cyber-attacks will continue to intensify. Discover how CIOs prioritize their mobile security investments today, and ensure mobility doesn't become a liability to your organization—even with the risk of data breach.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

  • Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud

    Sponsored by: Unisys

    Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.

  • Security Operations Centers: The Key to the Future

    Sponsored by: Intel

    Security operations centers (SOCs) can help enterprises gain better visibility into their environments. In this resource, expert Eric Cole explains how to get the most out of SOCs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.