ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Security Strategies for Success

    Sponsored by: Citrix

    Innovations in IT have created a new set of problems for security pros. To meet these challenges, you need some new tactics. Go inside this e-book to learn 5 steps to control apps and data, 3 strategies to manage compliance mandates, and more.

  • Analytic Stories or; "How I Learned to Stop Worrying and Respond to Threats"

    Sponsored by: Splunk

    This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.

  • A CISO's Guide to Mobile Threat Defense

    Sponsored by: Check Point Software Technologies Ltd.

    Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell India

    65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity?

  • The Human Side of IT Security

    Sponsored by: Dell India

    Humans will never be perfect, and human error can often lead to costly data breaches. It is for this reason, that many companies are going beyond simply investing in more expensive technology to solve their security issues, but also putting the strategies you can read about in this white paper to work to create a "culture of security".

  • The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure

    Sponsored by: Google Cloud

    Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.

  • Cloud Secure Virtualization Datasheet

    Sponsored by: IBM

    Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.

  • Ready for the GDPR? Think Again

    Sponsored by: Veritas

    This report looks to highlight the vital areas where organizations are going wrong, and what steps they can take to get into compliance with the GDPR set to go into effect in May of 2018.

  • Mid-Year Cybersecurity Report 2017

    Sponsored by: Cisco Systems, Inc.

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

  • Is DNS Your Security Achilles Heel?

    Sponsored by: Akamai Technologies

    This white paper explains how many attackers take advantage of recursive DNS, which almost every action on the internet relies on. Uncover 6 best practices you can follow to mitigate the risks.

  • GDPR Breach Notification Rule Could Complicate Compliance

    Sponsored by: Lepide Software

    Find out what GDPR compliance will entail, and what you can do to avoid the massive fine for failure to comply. Then, explore how the regulation's "breach notification rule" will prompt not just European companies, but those based in the US as well, to more promptly report a data breach.

  • How You can Secure the Use of Cloud Apps and Services

    Sponsored by: Symantec

    Learn about a Cloud Access Security Broker (CASB) that can help you securely adopt cloud apps and meet your regulatory compliance. Learn to identify, analyze, and eliminate the shadow IT plaguing your organization.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • A 5 Minute Guide to Security for Cognitive Search and Knowledge Management

    Sponsored by: Attivio, Inc.

    Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.

  • Insuring the uninsurable: Is cyber insurance worth its salt?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.

  • New Security Challenges Redefine Risk and Vulnerability

    Sponsored by: Fortinet, Inc.

    Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • Cybersecurity 101: The Fundamentals of Today's Threat Landscape

    Sponsored by: Kaspersky Lab

    In this e-book explore the growing trend of ransomware attacks and prevention tips for enhancing cybersecurity with automation techniques.

  • Reducing Attacker Dwell Time

    Sponsored by: Infocyte

    Discover how to reduce attacker dwell time with a threat hunting strategy that enables you to detect and resolve breaches to your network faster.

  • Cybersecurity — Whose Responsibility Is It?

    Sponsored by: Armor

    Who is responsible for security in the enterprise? Learn how to determine roles and responsibilities, as well as policies and processes, to build a culture of security.

  • How Should Companies Across the Globe Prepare for EU GDPR Compliance?

    Sponsored by: Commvault

    As the GDPR deadline looms, companies across the globe are hurrying to get into compliance. In this expert guide, learn how US based companies are doing when it comes to getting in-line with the GDPR, compared to European countries and the rest of the world. Then, find out what you can do to help speed your organization along the road to compliance

  • 2017 Global Security Report

    Sponsored by: Trustwave

    The reactive information security paradigm of 10 years ago can no longer defend against the virtual and connected threats of today. In this global cyber security report, read about the current state of IT security and how it fares against evolving threats from hackers and cybercriminals.

  • 4 Steps That Help You Protect Your Business

    Sponsored by: Ricoh - HarveyDavid

    As the security threats to your IT environments grow, it's increasingly important to have a holistic defense strategy in place. Discover the 4 stages to digital workplace security, and how you can make them a reality.

  • Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

    Sponsored by: nCircle

    This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.