ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Biometrics: A Modern Method Of Authentication

    Sponsored by: Comarch

    Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.

  • Mitigating The Impact of Critical IT Events

    Sponsored by: Splunk

    In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Case Study: Gain Real-Time Enterprise-Wide Visibility Into Site Operations

    Sponsored by: Splunk

    In this case study, learn now Zillow, a massive real-estate website, obtained crystal-clear operational visibility. Discover how it provides self-service abilities to teams to create custom solutions, ensures continuous website uptime, and is continually improving its incident isolation and mitigation abilities.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Combat Escalating Threats to Your Data Center

    Sponsored by: Juniper Networks, Inc.

    Discover how to provide industry-leading performance, scalability, resiliency, and accessibility to your data centers. Learn about modern security threats to your centers, the consequences of substandard or nonexistent security measures, and more.

  • A Step-By-Step Guide to Improving Application Insight

    Sponsored by: Splunk

    In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.

  • Password Management Evaluation Guide for Businesses

    Sponsored by: Keeper Security Inc

    Learn the little-known reasons as to why passwords don't live up to their potential as security measures, how they cause data breaches, and how your organization can enhance its use of passwords to keep your data safe and secure.

  • User and Entity Behavior Analytics (UEBA): Data Sheet and Use Cases

    Sponsored by: LogRhythm, Inc.

    Detect and neutralize known and unknown user-based threats with the help of user and entity behavior analytics (UEBA). With it, learn how to analyze diverse data sets to expose insider threats, compromised accounts, and privilege misuse and abuse—all in real time.

  • Case Study: Alliant Credit Union Evolves Real-Time Fraud Detection

    Sponsored by: LogRhythm, Inc.

    Read this case study to determine how Alliant Credit Union automated analysis of fraud-related patterns and trends in real time, by consolidating all machine data from IT events and financial transactions on one SIEM platform.

  • Why Your Business Needs Enterprise-Strength Password Management

    Sponsored by: Keeper Security Inc

    Learn how your enterprise can ensure that not only the strength of the passwords your teams use are up to par, but that they are regularly changed out, the secrets behind supportive authentication processes, and more.

  • Best Practices to Securing the Cloud and SDDC

    Sponsored by: Check Point Software Technologies Ltd.

    Join Jon Olstik, senior principal analyst at ESG, as he explores where the threat landscape has been, where it's going, and -- more importantly -- the tools and management strategies you need to address security gaps in your cloud infrastructure or SDDC.

  • Top Three Gaping Holes in Your Data Security

    Sponsored by: Globalscape

    Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.

  • The New Generation of Network Security

    Sponsored by: Juniper Networks, Inc.

    Learn the new strategy for network security amidst today's threat landscape. Discover how to create a malleable, proactive policy and implement it to keep your enterprise safe from modern malicious activity.

  • Agile Security for Virtualization, Software-DefinedNetworking, and Cloud

    Sponsored by: Fortinet, Inc.

    Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.

  • Be Afraid of Your Shadow: What Is Shadow IT? And How to Reduce It

    Sponsored by: Globalscape

    Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.

  • 2016 Security Report: Staying One Step Ahead

    Sponsored by: Check Point Software Technologies Ltd.

    This in-depth security report looks at what enterprises are encountering in known and unknown malware, attack trends, and the impact of mobile devices on the enterprise. Learn recommendations for staying a step ahead of cybercriminals.

  • Automating Advanced Security for the Software Defined Data Center

    Sponsored by: Fortinet, Inc.

    Discover how to protect your data centers, eliminate the need for manual intervention when it comes to deploying an ever-expanding infrastructure, and not let strong security measures get in the way of growth.

  • Addressing Your Cloud Security Challenges

    Sponsored by: Fortinet, Inc.

    Ease your move to the cloud with the advice offered in this white paper, including an overview of the main classes of cloud architecture, the security consideration of moving to the cloud, key challenges of public and private clouds, and more.

  • Global Banking Giant Streamlines and Strengthens Cybersecurity

    Sponsored by: Dell SecureWorks

    In this case study, learn how a European bank secured hundreds of locations worldwide and over 13,500 endpoints. All this while dropping their average of 70 billion security events monthly to 20-40 that needed attention and enhancing their regulatory compliance worldwide.

  • Is Managed Security Monitoring Right for Your Organization?

    Sponsored by: IBM

    The effort it takes to keep a security monitoring platform up and running can often make the whole endeavor seem more of a hassle than it is worth. Access this white paper now to learn whether managed security monitoring is right for your organization, and how to find the best partner for you.

  • User Provisioning Best Practices: Access Recertification

    Sponsored by: STEALTHbits

    User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification process in this e-guide from IAM expert Randall Gamby.

  • Learn New Techniques For Preventing Data Loss In The Cloud

    Sponsored by: Blue Coat Systems

    This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.