ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • The Role of Automation in Optimizing Network Performance and Security

    Sponsored by: FireMon

    As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.

  • Automated, Real-time Risk Analysis and Remediation

    Sponsored by: FireMon

    Managing risk within today's enterprise network environments is a significant challenge. This resource uncovers how to bridge the gap between enterprise risk and network teams.

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Cost of Cyber Crime Study

    Sponsored by: Hewlett Packard Enterprise

    In this Ponemon Institute report, learn why companies with high security profiles experience an average cost of cybercrime that is much lower than those with low profiles.

  • Internet Security Threat Report

    Sponsored by: Symantec

    In this comprehensive guide, review some of the major security attacks and vulnerabilities from 2016, and learn how it can inform your policy moving into the future.

  • Effectively Balancing DevSecOps

    Sponsored by: Flux7

    As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.

  • SME cyber security is increasingly a business imperative

    Sponsored by: ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • Compliance As Code - A Visual Guide

    Sponsored by: Flux7

    Discover how to automate compliance processes and track the configuration of AWS, an important resource for development, production, and security teams. Plus, learn how to easily customize 6 common AWS Managed Config Rules.

  • How SecOps Addresses Critical Security Vulnerabilities

    Sponsored by: BMC

    The rising number of devices connected to any given network, combined with common breakdown in communication between security and operations, creates a huge vulnerability problem. Use this white paper to find out how you can get your SecOps back on track.

  • Secure Cellular Connectivity Empowers BlueNRGY's Global Reach

    Sponsored by: Aeris

    IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.

  • How to Mitigate IP Theft by Departing Employees

    Sponsored by: Veriato, Inc.

    The greatest threat to your organization isn't some shadowy hacker, but rather disgruntled company insiders. Read on to learn about the 4 common ways employees steal data, how you can protect yourself, and more. Then explore 2 employee behavior monitoring programs that can provide real-time insights into any suspicious activity.

  • How User Monitoring Helps Protect Against

    Sponsored by: Veriato, Inc.

    In this white paper you'll learn why simply trusting your employees not to abuse their powers is not enough, and how this user and entity behavior analytics (UEBA) platform paired with user activity monitoring (UAM) can help create the secure environment you need.

  • The Ransomware Survival Handbook

    Sponsored by: Barkly

    This handbook will teach you everything you need to know about preventing, responding to, and recovering from a ransomware attack. From exploring what email documents it hides in, to a 4-step guide to bouncing back after ransomware infects your system, learn it all inside.

  • Securing Industrial IoT Technology: 4 Key Considerations

    Sponsored by: Bayshore Networks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

  • Your 3 Step Cybersecurity Checklist

    Sponsored by: Barkly

    IT security is a shifting landscape, and your policy needs to be ready to meet today's threats, as well as those that are still evolving. Find a 3-step checklist designed to help you craft a robust and adaptive security policy.

  • Cyber security in the Nordics

    Sponsored by: ComputerWeekly.com

    With the digitisation of life and work comes the 24-hour threat of cyber attacks. The Nordic region's pioneering spirit in the digital arena could easily turn heads, some of which may have malicious intent.

  • It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web

    Sponsored by: Authentic8, Inc.

    Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.

  • Why a Virtual Browser is Important For Enterprise Security

    Sponsored by: Authentic8, Inc.

    More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.

  • How to Enhance AWS Security

    Sponsored by: Splunk

    Here, you'll uncover guidance on enhancing AWS platform security, to quell data protection concerns. Access now to see how AWS can deliver top-notch security, as well as facilitate an adaptive environment armed with the actionable insights needed to help thwart and prevent future threats.

  • How LepideAuditor Helps You Detect and Prevent Privilege Abuse

    Sponsored by: Lepide Software

    Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.

  • How LepideAuditor Helps You Detect and Prevent Ransomware Spread

    Sponsored by: Lepide Software

    Learn about the important role of security audits in defending against increasingly complex ransomware attacks. Discover how to get real-time insights into changes in the configuration of systems like Active Directory, Exchange Server, and NetApp Filers.

  • Mobile Application Security: Discovering Leaks and Remediation

    Sponsored by: WhiteHat Security

    25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.

  • How to Track Privileged Users' Activities in the Active Directory

    Sponsored by: Lepide Software

    Privileged account abuse can result in data breaches, downtime, and failed compliance audits. Discover a 4 step process for tracking the activities of privileged user accounts to bolster your security posture and uncover an even easier way to audit privileged accounts and manage users' activities.

  • How LepideAuditor Helps You Detect and Prevent Insider Threats

    Sponsored by: Lepide Software

    Find out how to defend against insider threats by adopting stricter security measures. Discover tips on how to implement proactive auditing, determine who's logging on to your systems, prevent privilege abuse, mitigate the risks of inactive accounts, and more.

  • Improving Endpoint Security and Signature-Based Detection

    Sponsored by: Sentinel Labs, Inc.

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.