ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.

  • Can a CASB Protect You from the 2016 Treacherous 12? Infographic

    Sponsored by: Palerra Inc.

    Uncover if a Cloud Access Security Broker (CASB) is ideal for your enterprise's cloud security needs. Consult this infographic to see how CASBs measure up against the "Treacherous 12" threats identified by the Cloud Security Alliance, find detailed examples of cloud security issues and strategies relevant to your enterprise, and more.

  • Mobility In Financial Services: A Regulatory Compliance Checklist

    Sponsored by: BlackBerry

    Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.

  • Can a CASB Protect You from the 2016 Treacherous 12?

    Sponsored by: Palerra Inc.

    Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.

  • Protected Health Information Data Breach Report

    Sponsored by: Verizon

    Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.

  • IT Compliance and Security: Reduce Security Exposure from Months to Minutes

    Sponsored by: BMC

    Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.

  • Top 10 Values of Video Surveillance

    Sponsored by: Pivot3

    Discover 10 reasons why video surveillance should be integrated into your enterprise's security policy, providing such benefits as incident deterrence, regulatory compliance, enhancement of other security systems, and more.

  • Reduce the Threat Attack Surface with Prescriptive and Actionable Data

    Sponsored by: BMC

    What disconnected security and operations teams need is unprecedented visibility into their environment's threat stature. Learn how to bridge the so-called "SecOps gap" by prioritizing risks and reducing your overall attack surface.

  • 2016 Cost of Data Breach Study: United Kingdom

    Sponsored by: IBM

    Learn the true cost of a data breach in 2016. Obtain detailed knowledge of not only the monetary costs of a major data breach but also the details of lost business, 7 global megatrends in the cost of data breach research, and the biggest implications for your organization.

  • The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems

    Sponsored by: Verizon

    Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.

  • Breakthrough Security and Compliance Practices for the Digital Enterprise

    Sponsored by: BMC

    A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.

  • Amp Up Your Endpoint Data Security

    Sponsored by: Dell and Microsoft

    More and more organizations are finding that effective security starts with endpoints. Discover ways to dramatically reduce the risk of harmful data breaches with proactive data protection, and advanced threat prevention designed for the mobile era.

  • HITRUST CSF Certification – Frequently Asked Questions

    Sponsored by: Coalfire

    What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.

  • 5 Security Best Practices Every Developer Needs to Know

    Sponsored by: CloudMine

    Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.

  • Survey Results: Wireless Security Trends

    Sponsored by: Fortinet, Inc.

    Over half of 1,300 surveyed IT decision-makers revealed their preference for cloud-based wireless network management. Explore how to enable the segmentation of devices and access layers across wired/wireless networks.

  • Sandbox Technology: Building an Effective Breach Detection and Response Strategy

    Sponsored by: Fortinet, Inc.

    Security professionals need to detect threats and manage risks to avoid data breaches. Discover why sandboxing is an essential component of a comprehensive prevention, detection, and response strategy to mitigate future attacks.

  • Advanced Threat Protection Buyer’s Guide

    Sponsored by: Fortinet, Inc.

    To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.

  • A Look Behind the Firewall

    Sponsored by: Fortinet, Inc.

    Discover in this infographic how to diagnose your network performance based on traffic devoted to social media, audio, and video—and determine how this media may compromise your security. Read on to discover how to run a cyber-threat assessment to ensure your core business assets are well protected.

  • State of Trust Gap in 2015

    Sponsored by: MobileIron

    Discover important expectations and viewpoints employees have about their enterprise's privacy policies on personal data located on mobile devices. Uncover statistics and global highlights derived from the Trust Gap Survey data.

  • Easily Access Behind-the-Firewall Resources

    Sponsored by: IBM

    Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.

  • Secure Browser for Mobile Enterprise Devices

    Sponsored by: IBM

    Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.

  • Protect and Distribute BYOD documents

    Sponsored by: IBM

    Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.

  • Secure Enterprise Email on Mobile Devices

    Sponsored by: IBM

    Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.

  • Architecture Matters: Beyond Layered Security Approaches

    Sponsored by: Palo Alto Networks

    The foundational architecture of a firewall and security platform matters. Explore ways to build a comprehensive set of defenses that not only discourages attackers, but also prevent data breaches.

  • Laptop Management for Windows

    Sponsored by: IBM

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.