ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • What to Look for in Multifactor Authentication Tools

    Sponsored by: SearchSecurity.com

    In our threat-laden environment, multifactor authentication tools are a critical defense. Access this resource and learn the latest about MFA technology, how to compare MFA tools and select the right product for your organization.

  • Study Shows New Generation of IT Security Threats

    Sponsored by: Dell, Inc. and Intel®

    This report relays the importance of embracing both evolving workforce demands and more advanced, converged infrastructure. View now and learn how to prepare for the potential threats and vulnerabilities of BYOD and cloud technology, while increasing productivity and competitive advantage.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

  • Formulate a Game Plan for Closing the SecOps Gap

    Sponsored by: BMC

    Access this report to discover why collaboration between security and operations (SecOps) will drive faster threat response, stronger security, and improved compliance in your organization. Take a closer look at the SecOps gap now, and learn the gravity of IT misalignment.

  • Privileged Access Management Security Survey Results

    Sponsored by: Hitachi ID Systems, Inc.

    This white paper provides you with the path to successful privileged access management (PAM) and securing your organization from identity fraud.

  • Integrating Password Management with Enterprise Single Sign-On

    Sponsored by: Hitachi ID Systems, Inc.

    In this document, you will compare password synchronization and reset tech to enterprise SSO, and examine how each addresses the pressing business problem of securing authentication. Discover how to integrate these dueling technologies, and identify several interoperability challenges.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • 2016 Cyberthreat Defense Report

    Sponsored by: Imperva

    You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".

  • Reframe The Business Case For Identity And Access Management In Security Terms

    Sponsored by: Okta

    In this white paper, learn how to define, measure, and track security metrics to justify the business case for IAM implementation. Read on to learn why you can't secure your enterprise without zero trust identities and how access management centralizes control and lowers costs.

  • How to Handle a Ransomware Hijacking

    Sponsored by: ESET

    This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.

  • Report: (In)Security Everywhere in 2016

    Sponsored by: ESET

    In this report, you'll uncover ways to plow through 2016 with a proactive attitude of security awareness. Read on to learn about the current state of security (or lack thereof), and what you can do to rise above emerging threats such as ransomware, targeted attacks, crimeware, haxposure, and more.

  • Tips from a Security Researcher: Choose the Right Anti-Virus Solution for your Business

    Sponsored by: ESET

    In this tech brief, one analyst urges you to look at several different antivirus solutions and come up with a short list of three vendors. Access now for details on three steps to take when searching for an anti-virus solution that fits your needs.

  • Windows Security Management: What's New in Windows 10

    Sponsored by: LogRhythm, Inc.

    In this white paper, you'll explore how new auditing and logging capabilities in Windows 10 give IT visibility into potential threats. Uncover ways to thwart threat actors by scoping user privileges, logging on with additional credentials, and more.

  • Secure Retail Eases the BlackBerry to iOS Transition

    Sponsored by: IBM MaaS360

    In this white paper, you will discover a comprehensive security solution for iOS devices that has a clean and intuitive interface with easy reporting and usage tracking for expense management. Read on to meet your key functionality requirements for your mobile policies and safely incorporate iOS into your MDM.

  • How to Mobilize your Corporate Content and Apps

    Sponsored by: IBM MaaS360

    In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.

  • Best Practices for Mobile Application Lifecycle Management

    Sponsored by: IBM MaaS360

    In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.

  • A Guide to 12 CyberSecurity Metrics You/Your Vendors Should be Watching

    Sponsored by: BitSight

    This white paper details 12 actionable metrics that can help you specifically assess how your organization is doing with its current cybersecurity.

  • Mobile Device Management Policies: Best Practices Guide

    Sponsored by: IBM MaaS360

    Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.

  • The Current and Future State of IT Security

    Sponsored by: Dell, Inc. and Intel®

    To know what needs improvement, decision-makers need only look to their peers. Learn the priorities, challenges and strengths in IT security from 1,440 interviews conducted by market research analysts Vanson Bourne.

  • The Value of Threat Modelling

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.

  • The Forrester Wave: Information Security Consulting Services

    Sponsored by: IBM

    This Forrester report details and analyzes the 13 most significant security consulting service providers and their offerings. Access now to learn more about how well these consultancies fulfill security standards to best select the right partner for your business.

  • Gartner Toolkit for CISOs: Prebuilt Slides to Share with the Board

    Sponsored by: Imperva

    This Gartner Toolkit helps technology management prepare updates for their senior executives or their board, sponsored by Imperva.

  • Top 5 Benefits of a Security Operations Center

    Sponsored by: IBM

    This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise SOC.

  • Evaluating the Expanding Cloud Access Security Broker Market

    Sponsored by: Blue Coat Systems

    In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: UnitedLex

    While global threat intelligence services can be a powerful business security tool, it's not the first one you should consider when setting strategy for better business security. Read on to evaluate the role of global threat intelligence in today's enterprise and assess other tactics to bolster this strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.