ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • What Trust Can Mean to Your Enterprise's Cloud Policy

    Sponsored by: Entrust, Inc.

    Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.

  • Network Security: How Miller Paint Saved $150k a Year

    Sponsored by: WatchGuard Technologies, Inc.

    Learn how Miller Paint managed to save itself over $150k a year on their network security, improve service, and make the upgrade quickly with minimal fuss. Read on to learn what steps were taken to ensure this smooth changeover and what their next steps were.

  • 7 Ways To Make Yourself Hard To Hack

    Sponsored by: Solarwinds MSP

    Your corporate data is likely spread across devices, networks, and servers. Learn 7 ways to make yourself harder to hack and secure your data. Learn to take a layered approach to security, increase network visibility to help spot system anomalies and more.

  • Focus: Securing for the future

    Sponsored by: ComputerWeekly.com

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

  • Nine Types of Cyber Threats and How to Stop Them

    Sponsored by: Solarwinds MSP

    Learn how to create an effective IT strategy against all unknown and known threats, how to improve security by viewing customers' networks as targets, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: SingTel

    Learn the five major threats to mobile security, how they can damage your enterprise, and what you can do to stop them.

  • Cybersecurity: Shift from a Position of Acknowledgement to Leadership

    Sponsored by: SingTel

    Learn how to effectively address and oversee decisions relating to cyber security using a top-down approach and establish a well-defined security posture for your organization.

  • 2017 Security Protection: 7 Threat Predictions

    Sponsored by: WatchGuard Technologies, Inc.

    Access this infographic and accompanying videos to learn the top 7 security threat predictions for 2017. Discover the rise of the Ransomworm, IaaS as both attack platform and surface, botnets targeting IoT devices, and more.

  • Protecting your organisation from itself

    Sponsored by: ComputerWeekly.com

    This report from QuinetiQ offers advice on mitigating the risks of cyber breaches from inside your organisation.

  • Mobile: Enhanced Security, Consistent Management, Open Framework

    Sponsored by: SOTI Inc.

    Learn how to make it easier than ever for your organization to support Android as a part of a BYOD or corporate owned personally enabled (COPE) device program. Read on to find challenges to both strategies, what benefits can be reaped from this approach, and more.

  • Five Mobile Security Myths Debunked

    Sponsored by: SingTel

    Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.

  • Security for the Future-Ready Workforce

    Sponsored by: Dell, Inc. & Intel®

    To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: SingTel

    Learn how to counter the modern threat landscape of phishing, ransomware, and other malware. An enterprise's defense against such malignant activates can mean the difference between success and going out of business.

  • Survey Findings: Data Security

    Sponsored by: Dell, Inc. & Intel®

    This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.

  • 2016 Security Pressures Report

    Sponsored by: SingTel

    The recommendations in this resource can serve as a reliable compass for where your security efforts need to be going into the future. These best practices will not only placate security pressure, but also help make your organization more secure overall.

  • Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams

    Sponsored by: Mimecast North America

    Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.

  • Five Tactics to Stop Email Attacks

    Sponsored by: Mimecast North America

    Access this resource now to get a breakdown of traditional phishing, spear-phishing, and whaling, and uncover 5 tips to help you prevent this email fraud.

  • Tackle Email Fraud with Comprehensive Targeted Threat Protection

    Sponsored by: Mimecast North America

    This research report from 451 Research highlights Mimecast's expansion into the targeted threat protection market. Access now to compare various vendors and what they can do for your enterprise and uncover the analysis of Mimecast's strengths, weaknesses, threats and more.

  • Best Practices for Enterprise Security

    Sponsored by: Citrix

    The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.

  • Mobile Security Checklist: Top Ten Threats to Your Enterprise Today

    Sponsored by: BlackBerry

    Access this white paper to find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers.

  • Mobile Security Addressing the Evolving Threat Landscape

    Sponsored by: SOTI Inc.

    Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.

  • Computer Weekly: Data Danger

    Sponsored by: ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • Web Application Firewall: Delivering Must-Have Protection for the Modern Enterprise

    Sponsored by: Citrix

    To thoroughly protect numerous web properties, you need to supplement basic network security and firewall solutions with web application firewall tools. Learn what's currently available as essential components for web protection.

  • The Suspicious Seven: A Network Visibility Checklist

    Sponsored by: Cisco Systems, Inc.

    Discover an outline of seven of the most common types of network blind spots and suspicious activities that every security team needs to be able to see.

  • Secure Enterprise File Sharing and Mobile Content Management

    Sponsored by: BlackBerry

    Discover how to utilize a highly mobile and collaborative method of document sharing without sacrificing security. Learn how to protect intellectual property, exchange files through data rooms for M&A, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.