ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Exposing the Unknown: How Sanboxing Technology Fights Modern Threats

    Sponsored by: Check Point Software Technologies Ltd.

    Access this white paper to examine the challenges enterprises face today, and the increasing need for comprehensive security solutions. Read on to also explore the emerging role of sandboxing as a powerful weapon in cyber security.

  • How to Conquer the Biggest AWS Adoption Challenges

    Sponsored by: Palerra Inc.

    Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.

  • Use Secure Cloud and Scalability to Revolutionize B2B Payments Market

    Sponsored by: Armor

    Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.

  • Azure Security and Identity Management Best Practices

    Sponsored by: Rackspace

    Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.

  • Cloud Security Automation: Are We Up To The Task?

    Sponsored by: Palerra Inc.

    In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.

  • A Unified View for Proactive Security

    Sponsored by: Fortinet, Inc.

    Discover the major trends in proactive security and how your enterprise can capitalize on them today. Learn the benefits of unified visibility and integrated security, as well as how they can fit into your enterprise's policy.

  • Cloud Security Spotlight Report

    Sponsored by: Palerra Inc.

    This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.

  • Ransomware: Attack Trends, Prevention, and Response

    Sponsored by: Check Point Software Technologies Ltd.

    Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.

  • Overcome the Limitations of Traditional Cloud Security for Office 365

    Sponsored by: Palerra Inc.

    See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.

  • Mobile Security and Risk Review

    Sponsored by: MobileIron

    Discover how the mobile threat landscape is changing as well as staying the same. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • Insider Threat Spotlight Report

    Sponsored by: Palerra Inc.

    In this extensive report, discover a detailed breakdown of how insider threats to enterprise data are on the rise and tap into some of the best ways to mitigate this risk to business data. Learn key trends that create vectors of attack for insiders, what the top offenders look like, which assets are most at risk, and more.

  • Spotlight on Insider Threats to Cloud Applications

    Sponsored by: Palerra Inc.

    In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.

  • Ransomware: What You Need to Know

    Sponsored by: Check Point Software Technologies Ltd.

    This article provides an overview of the world of ransomware. Uncover the differences between the most prevalent ransomware families, insights on smaller yet unique ransomware, and most importantly, mitigation and protection methods.

  • Addressing the Security Dangers of "Appification"

    Sponsored by: IBM

    Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.

  • Facing up to Mobile Security Challenges

    Sponsored by: IBM MaaS360

    Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.

  • Build a Cohesive, Effective Security Strategy

    Sponsored by: Splunk

    Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.

  • Defend your Organization with Advanced SIEM and Privileged Account Controls

    Sponsored by: Splunk

    As SIEM technologies change, it's important that your own approach to SIEM evolves to incorporate these advances. Discover 4 recent advances as relayed by experts, including big data adoption, threat intelligence feeds, and more. As a bonus, learn tips on limiting privileged accounts and boosting security.

  • The 2016 Global Cloud Data Security Study

    Sponsored by: Gemalto

    When done right, securing the cloud can have a domino effect on improved access management, encryption, efficiency, and competitive advantage. Learn more about what 3,476 IT pros worldwide are saying about cloud governance and security practices.

  • BYOD: Keeping the Benefits While Staying Secure

    Sponsored by: IBM

    In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Guide to Making The Cloud Secure

    Sponsored by: BT

    Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.

  • Combating APT in a New Way

    Sponsored by: Exabeam

    Discover how to provide a new layer for your enterprise's security analytics and stop data leaks due to advanced persistent threats. Learn the fundamentals of these malicious attacks, how they are changing, and how you can change to combat them.

  • Putting Military Strategy to Work Against Malicious Activity

    Sponsored by: AlienVault

    Discover how your enterprise can put the OODA Loop (Observe, Orient, Decide, Act) philosophy (developed by US Air Force military strategist John Boyd) to work in combating data breaches. Learn to observe a crisis from all angles, review events in the context of other network activity to establish a timeline, quickly implement remediation, and more.

  • Cool Vendors in Cloud Security Services

    Sponsored by: OpenDNS

    In this Gartner report, discover key findings into the cloud security landscape, in-depth analysis into cloud security providers, and unbiased recommendations to CISOs who are evaluating technology trends and planning future needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.