ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Your Guide to the 2016 Global Threat Intelligence Report

    Sponsored by: Cisco and Dimension Data

    Security isn't just beating today's threats: It's a matter of preparing for future threats and mitigating their effects. Dive into this global threat intelligence report and learn how to leverage deep insight into lessons learned from 2016 and 2015, what weaknesses the industry has yet to rectify, what hackers are targeting and where, and more.

  • Top IT Trends in 2017: Cybersecurity

    Sponsored by: Cisco and Dimension Data

    With so many enterprises making the transition to digital business, the entire landscape of cybersecurity has shifted and morphed dramatically over the past year. This list will delve into 5 top IT trends that will shape 2017 and beyond as it pertains to cybersecurity, the digital transformation, identity, and more.

  • Top 5 Considerations: What to Look For in Mobile Banking Security

    Sponsored by: HID

    Uncover 5 criteria when looking at choosing a mobile banking security solution. Also discover concise market overview of mobile banking apps including a look at opportunities for growth and major obstacles.

  • Single Secure Credential to Access Facilities and IT Resources

    Sponsored by: HID

    For enterprises, this means securing your premises can be just as important as securing your network. The best software won't prevent loss if a malicious individual gains physical access to your assets. Access this white paper to learn how your organization can improve their security posture with advanced identity and access management.

  • 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Sponsored by: Entrust, Inc.

    There is no denying that mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.

  • Keeping Your Office 365 Implementation Secure and Effective

    Sponsored by: Box

    In this webinar, learn how to handle security concerns in your Office 365 deployment, how to best address your content management needs before, during, and after Office 365 transition, and what you can do to help your employees make the most of the suite's features.

  • The Rise of the Secure Internet Gateway

    Sponsored by: Cisco and Dimension Data

    With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.

  • How to Prevent Attacks from Ever Breaching You in the First Place

    Sponsored by: Cisco and Dimension Data

    Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.

  • Five Ways to Ensure Digital Business Success

    Sponsored by: Entrust, Inc.

    Discover what the digital transformation means to you, how you can capitalize on it, and how to keep your data secure in a future where borderless networks like the cloud and the connectivity of the IoT are bringing us closer together every day.

  • ebook-enterprise-security-NEW[

    Sponsored by: Fortinet, Inc.

    An open, end-to-end security fabric system (which can scale and adapt to changing network demands) allows organizations to address the full spectrum of challenges they currently face across the attack life cycle. In this white paper learn how to address today's threat trends by thinking about security in a new way.

  • How to Start Building an Enterprise Application Security Program

    Sponsored by: tCell

    In this expert e-guide, get a handle on where to start with application security so that you never give attackers a chance.

  • How To Limit Privileged Accounts And Boost Security

    Sponsored by: Devolutions

    Too many privileged accounts can result in access abuse in enterprises.This expert e-guide details which account privileges should be limited to reduce security incidents, how pervasive the risk is, and the challenges associated with privileged accounts.

  • Simplifying & Securing Your Cloud Apps Deployment

    Sponsored by: Entrust, Inc.

    With an increasing number of internal, external, and self-propagating threats, your organization needs a better way for deploying cloud-based authentication. Learn how to achieve authentication success using SSO technology, gain highly efficient provisioning, and more.

  • Accelerating Business Transformation with Effortless Authentication

    Sponsored by: Entrust, Inc.

    In this white paper learn how to attain enterprise-grade authentication and enable bold digital business strategies via foundational security.

  • Understanding the IoT Explosion and Its Impact on Enterprise Security

    Sponsored by: Fortinet, Inc.

    Understanding and leveraging the explosive growth and innovation of the Internet of Things is vital if an organization is striving for success. But how do you take advantage of it without introducing security risks? Delve into the complexities of IoT including security, data management, trends, and more.

  • Trusted Identities: An Imperative for Digital Transformation

    Sponsored by: Entrust, Inc.

    Learn how with a trusted identity, enterprises can be bold, but without it, they limit the business potential and the level of innovation through newly introduced risks.

  • How to Achieve Stronger Information Security

    Sponsored by: Iron Mountain

    Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security.

  • The Future of Privileged Management: Understanding the Bigger Picture

    Sponsored by: One Identity

    Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.

  • Safeguard Data Stored and Managed in Cloud Environments

    Sponsored by: Gemalto

    This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.

  • Encrypt Everything: How to Un-share and Secure Your Sensitive Data

    Sponsored by: Gemalto

    Learn how to find a way to balance critical business needs and requirements, while protecting your data from malicious threats.

  • Ensure the Right Solution for your RSA Data Protection Manager Migration

    Sponsored by: Gemalto

    When looking to migrate your data protection manager (DPM), don't settle for re-packaged solutions that are not purpose built for your specific use case. This white paper details how to migrate your RSA DPM manager smoothly.

  • Remove Complexity from Defending Data with a Secure Managed Cloud

    Sponsored by: Armor

    The complexities of cybersecurity are daunting for any organization. But for businesses that need battle-tested security and infrastructure to defend critical data workloads and assets that intricacy is magnified. Learn about a cloud security platform that can remove the complexity from defending data with key security functionality.

  • How to Use Log Management in Incident Response

    Sponsored by: Logentries

    Learn the benefit of high synergy between IT incident response and log management systems. See as experts dive into 2 use cases for leveraging logs in incident response.

  • Your Guide to the Threat Landscape

    Sponsored by: Fortinet, Inc.

    Take a look at five recent networking trends, why they represent real risk to your organization, and ways to implement a new security strategy that will allow you to embrace the opportunities of the digital economy with confidence.

  • Cyber-physical attacks: Dawn of a new age in cyber-warfare?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series explores the application of cyber power in international relations

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.