ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Interview: One Trust Leader reveals how Security breeds Innovation

    Sponsored by: Unisys

    The Chief Trust Officer at Unisys promotes cyber-security, physical security and governance in both online and offline communities. Discover ways his work combines security and innovation, and what this means for your organization.

  • 10 Reasons to Archive Your Email in the Cloud

    Sponsored by: LogicNow

    Discover 10 reasons why archiving your email in the cloud can give your enterprise an edge, including: hit the ground running with a low barrier to entry, more certainty when estimating costs versus in-house, lower management costs, and more.

  • Extend Your Access Management Regime To Office 365

    Sponsored by: IBM

    See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.

  • ESG Lab Review: Performance and Scalability as Key Firewall Requirements

    Sponsored by: Juniper Networks, Inc.

    A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.

  • Combat Escalating Threats to Your Data Center

    Sponsored by: Juniper Networks, Inc.

    This brief discusses the security threats that businesses are facing in the data center, the consequences of substandard or nonexistent security measures, and primary strategies for these problems. Access now to learn more.

  • Think Again if you believe your email archiving problems are solved with Office 365

    Sponsored by: LogicNow

    Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.

  • Real-Time Voice Authentication at the Call Center

    Sponsored by: NICE Systems, Inc

    Biometrics offers one of the best opportunities to improve security and the customer experience. Discover the advantages of biometric authentication by reducing handle time by 25 to 45 seconds, save significantly in the call center, and more.

  • How Banks Secure Conversations with their Most Valued Customers

    Sponsored by: NICE Systems, Inc

    Voice biometrics technologies are proving to be the ideal candidate for intelligent authentication in the context of client-to-advisor conversations. Discover ways to leverage a person's voice as an accurate identifier without interrupting the natural flow of conversation.

  • Security Strategies for the Financial Sector

    Sponsored by: Unisys

    Financial institutions must tighten security to stop threat actors, or they could create a chain reaction and cripple world trade. Access this resource to learn about tools with a history of stopping cybercrime in the banking industry.

  • Bullet-proofing Office 365 Email

    Sponsored by: LogicNow

    Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.

  • Above Security Delivers Customer Value

    Sponsored by: Above Security

    It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.

  • Security Solution Trends 2016

    Sponsored by: Juniper Networks, Inc.

    In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

  • How to Approach Storage Disaster Recovery

    Sponsored by: Rubrik

    In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.

  • Don't let your on-premises Active Directory be your Achilles' heel

    Sponsored by: Dell, Inc.

    Learn how a hybrid Active Directory (AD) can keep your network safe from the vulnerability normally suffered by on-premises ADs. Discover how it establishes configuration baselines, detects and alerts administrators of realized and potential threats, and remediates unauthorized access and security changes.

  • Assessing and Sharpening your Security Controls

    Sponsored by: eTECH Channel

    Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.

  • What to Look for in a Security Partner

    Sponsored by: Arbor Networks

    Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.

  • DDoS Mitigation Case Study - The Extra Mile

    Sponsored by: Arbor Networks

    Discover the steps that you can take to recover from a debilitating DDoS attack. Learn the importance of going beyond just a quick fix and securing a multidirectional approach that deploys more than just a product.

  • Perspective: The art and science of value realization in the cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • The Importance of DDoS Mitigation

    Sponsored by: Arbor Networks

    In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.

  • DDoS Attack: Smoke Screen or Smoke Signal?

    Sponsored by: Arbor Networks

    Learn how distributed denial-of-service (DDoS) attacks are used as not only a means of direct harassment of enterprise data, but also as a "smoke screen" in an attempt to conceal more surgical intrusion tactics. Discover why organizations must recognize DDoS attacks for the data security threats that they have become.

  • Don't Let The Cloud Cast A Shadow On Security

    Sponsored by: Cisco Systems, Inc.

    Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.

  • Penetration Testing: Protect Customer Data and Your Business From a Breach

    Sponsored by: eTECH Channel

    Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.

  • The Bot Problem: Managing Bot Traffic in the Travel Industry

    Sponsored by: Akamai

    In this white paper discover how bots affect search visibility, aggregation, and on-site performance, and more. Learn what can be done to respond to these bots and achieve the goals for your site.

  • The Current Landscape of Advanced Persistent Threats

    Sponsored by: Proofpoint, Inc.

    In this e-guide, discover not only how to talk about Advanced Persistent Threats within your enterprise, but also uncover what the current landscape looks like in regards to these ever-evolving malicious attacks.

  • Testing the Cloud: Ensuring Enterprise Data is Secure

    Sponsored by: TrendMicro

    In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.