ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Identity Management: The Key to Stopping Breaches

    Sponsored by: SailPoint Technologies

    With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.

  • Report: Tracking Global Internet Encryption Trends

    Sponsored by: F5 Networks

    Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.

  • Achieving Optimal IFRS 9 Compliance

    Sponsored by: SAS

    Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.

  • How to Secure Your Digital Experience

    Sponsored by: Oracle Corporation

    Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape

  • IAM: Your Tool to Defeating Data Breaches

    Sponsored by: SailPoint Technologies

    A disturbingly common thread with data breaches is that someone inside the organization did something they weren't supposed to. Discover why insider threats are so universal, why they may not be as malicious as you think, how technological vulnerabilities are now less of a security concern than human weaknesses, and more.

  • Security Report: Transaction Monitoring Optimization

    Sponsored by: SAS

    Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.

  • SAS Solution for Personal Data ProtectionEnabling compliance with new regulation

    Sponsored by: SAS

    Failing to comply with the GDPR results in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.

  • SailPoint-Get-Ready-for-GDPR

    Sponsored by: SailPoint Technologies

    Learn how to utilize both identity and data access governance to gain full visibility to help you comply with the upcoming GDPR deadline.

  • Secure and Govern Workloads and Infrastructure with Policy

    Sponsored by: Apcera

    Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.

  • The Role of Policy in Governing and Securing the Cloud

    Sponsored by: Apcera

    Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches, 4 key areas where you need security policy, a 3-part methodology to modern policy, and more.

  • Cyber Threats: A perfect storm about to hit Europe?

    Sponsored by: ComputerWeekly.com

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

  • Do You Know Who Owns Your Data?

    Sponsored by: SailPoint Technologies

    Access this white paper to learn how to reduce the risk of your unstructured data being used negligently or maliciously, elect the right "data owners" to ensure the security of your data, and more.

  • Safeguarding Healthcare Information and Leveraging Email Encryption in Your HIPAA Compliance Program

    Sponsored by: Hewlett Packard Enterprise

    Learn how to choose the right email encryption tool for your healthcare organization by keeping these 6 key differentiators in mind as you evaluate potential solutions.

  • The Ultimate Guide to the CCSP

    Sponsored by: ISC2

    Learn how to prepare yourself for getting a CCSP certification, named the #1 cloud computing certification for 2017 by Cloud Computing Intelligence.

  • Employee Monitoring: An Important Security Measure?

    Sponsored by: Veriato, Inc.

    Learn how to mitigate the threat posed by threats from within your own enterprise, and what court rulings could affect this.

  • Is the Future of Enterprise Security In Managed Services?

    Sponsored by: F5 Networks

    Security is becoming an increasingly complex and costly challenge for many organizations to manage on premises. Access this white paper now to learn the potential benefits of outsourcing cybersecurity and more.

  • Keeping Up with the Evolution of Security Operations Centers

    Sponsored by: McAfee, Inc.

    Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.

  • 77% of Hacked Passwords Comply with Current Standards

    Sponsored by: Specops Software

    Discover a method of granulated password policy application that provides protection and support not available under the default Window's password policy. Also uncover a link to a password strength auditor and more.

  • Log Management and Analytics: Your Guide

    Sponsored by: Logentries

    Discover a demonstration on exactly how to successfully manage logs, server data, and analytics.

  • Hackers Share Secrets so You Can Make Their Job Harder

    Sponsored by: Thycotic

    Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.

  • What New NIST Password Recommendations Should Enterprises Adopt?

    Sponsored by: Specops Software

    Learn what makes a password effective for your enterprise, password best practices, and what can be learned from the NIST guidelines.

  • A Safe Password System? Here's How

    Sponsored by: Specops Software

    Learn the ropes of what makes for more effective password risk management, how to avoid common pitfalls organizations make in implementing password policies, and 3 major risks of password compromise.

  • Passwords Defined: Build Stronger Passwords

    Sponsored by: Specops Software

    Learn 2 actionable insights to make your passwords less vulnerable to brute force and dictionary-style attacks. Discover what makes common passwords weak, and what to avoid when choosing yours.

  • Password Security Checklist: Ensure PCI Compliance

    Sponsored by: Specops Software

    Uncover vital questions to provide your organization with a good starting point on the path to improving your password security.

  • 3 Common Password Policy Mistakes

    Sponsored by: Specops Software

    Most organizations don't have adequate password policy requirements. Take a look at the 3 common password policy mistakes that your organization might be making.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.