ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • A Smart Way to Protect Windows Server 2003

    Sponsored by: Unisys

    Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.

  • There's Never Been A Better Time to Worry Less and Innovate More

    Sponsored by: Cisco

    You need tools that fight digital vermin for you. Explore ways to leverage simple security, so your business can do what it does best: innovate and grow.

  • Connected Medical Devices Meet FDA Scrutiny

    Sponsored by: Symantec Corporation

    Cybersecurity threats to medical devices are a growing concern, particularly in the new era of IoT. Discover the FDA-recommended steps that manufacturers and users of connected medical devices should take to ensure cybersecurity.

  • Modern Adaptive Security

    Sponsored by: Illumio

    Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.

  • Redefining the Mission of Mobile Authentication

    Sponsored by: Aruba Networks

    Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.

  • Empowering Mobile Security with Policy Management

    Sponsored by: Aruba Networks

    Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rule sets associated with legacy authentication, authorization and accounting.

  • Gain Capabilities to help you Protect, and Insight to Understand

    Sponsored by: Check Point Software Technologies Ltd.

    As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.

  • Best Practices for Strong Cyber Security

    Sponsored by: Hewlett Packard Enterprise

    Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.

  • IT Security Threats Facing Retail in 2016

    Sponsored by: Verizon

    This report reveals the 3 top IT security threats facing retail businesses in 2016. You'll see how you're vulnerable and what steps to take to begin improving your security strategy.

  • Cybersecurity for Banking and Financial Institutions

    Sponsored by: Delta Risk

    Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.

  • How to Decide on Next-Gen Firewalls

    Sponsored by: Fortinet, Inc.

    Firewalls are must-have network security tools and a new generation of firewalls is emerging. This comprehensive guide examines next-generation firewalls, how to evaluate vendors and what to consider before making a purchase.

  • Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

    Sponsored by: Check Point Software Technologies Ltd.

    To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.

  • Rapid Response Retainer Services

    Sponsored by: Verizon

    Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.

  • User Behavior Analytics: Track Individual Data and Activities in Your Network

    Sponsored by: Exabeam

    Insider threats are a top vulnerability for many organizations. In this e-guide, you'll learn about the threat posed by individual network users, and how to leverage user behavior analytics to track and expose them.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • Identity-Driven Micro-Segmentation Everywhere you Work

    Sponsored by: Unisys

    Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.

  • Anatomy of a Cyber-Attack

    Sponsored by: Dell Software

    You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.

  • How One Security Expert is Exploring Modern Threats to Enterprises

    Sponsored by: Check Point Software Technologies Ltd.

    Organizations that deploy the right defenses, adopt the right governance, and train the right teams can achieve security in the evolving war over data. Discover ways to adapt your security strategy to new business models through a growing number of channels.

  • Data Privacy and Protection: 5 Insights from the Experts

    Sponsored by: Iron Mountain

    With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.

  • E-Waste Is More Than Just Clutter

    Sponsored by: Iron Mountain

    Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.

  • Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud

    Sponsored by: Unisys

    Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.

  • A Comprehensive, Innovative Approach to Cloud Security

    Sponsored by: Unisys

    The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.

  • Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems

    Sponsored by: Unisys

    Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.

  • Your Complete Guide to Office 365 Security

    Sponsored by: Datto, Inc.

    Get an in-depth look at the security features that Microsoft has built into Office 365. Learn how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data, including O365 encryption, multi-factor authentication, and more.

  • Defending Your Office 365 Data: A Complete Guide

    Sponsored by: Datto, Inc.

    Discover the pertinent security risks inherent in Office 365, and learn where its built-in security falls short and how you can shore up your defenses to compensate. Gain the knowledge you need to stay secure while taking advantage of the benefits of Office 365 by learning about the 5 most prevalent threats to this platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.