ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • modusCloud Email Security URL Defense

    Sponsored by: Vircom

    Discover how SMBs can improve their security posture and proactively weed out malicious URLs with modusCloud Email Security. Learn how to prevent the damaging effects of malware attacks with cloud-based, real-time dynamic malware analysis, predictive analytics, and threat intelligence.

  • Identify, Connect, and Protect Mobile and IoT at the Edge

    Sponsored by: Aruba Networks

    Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.

  • 6 Best Practices for Securing AWS Environments

    Sponsored by: Centrify Corporation

    Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.

  • Your In-Depth 2017 Cybersecurity Report

    Sponsored by: Comstor

    Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.

  • The Impact of Data Breaches on Reputation and Share Value

    Sponsored by: Centrify Corporation

    Discover how IT practitioners view the impact of data breaches on reputation and share value. Step into their shoes to learn more about the correlation between security posture ad brand reputation, customer concerns for privacy and data security, and more.

  • Become a Champion of PCI Compliance by Minimizing Your Attack Surface

    Sponsored by: Centrify Corporation

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

  • Protect Against Cyberattacks and Data Breaches with Multi-Factor Authentication

    Sponsored by: Centrify Corporation

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

  • Stop The Breach: Reduce The Likelihood Of An Attack Through An IAM Maturity Model

    Sponsored by: Centrify Corporation

    Forrester Research investigated the connection between increased adoption of identity and access management (IAM) best practices and reducing the likelihood of experiencing a security breach. Uncover their key findings to learn more about the efficacy of different IAM approaches and technologies.

  • Confronting Today's Advanced Email Threats

    Sponsored by: Vircom

    Email is becoming one of the most favored attack surfaces used by malicious actors to harm your organization. Discover how to protect your enterprise from the growing number of sophisticated threats in today's threat environment.

  • 10 Reasons Your Cyber Security Strategy Needs A Checkup

    Sponsored by: Rackspace

    Click into this infographic to learn the 10 reasons your security might need a checkup.

  • Public Employees' Retirement System Increases Network Visibility and Streamlines Security

    Sponsored by: Gigamon

    Discover how Public Employees' Retirement System enabled full visibility into their entire network and bolstered their security posture. Find out how they enabled consistent access to key information, improved threat management, enhanced network security, and more.

  • Vela Trading Technologies Depends on Gigamon for Real-Time Troubleshooting

    Sponsored by: Gigamon

    Discover how Vela Trading Technologies bolstered their network security without hindering employee productivity. Find out how they enhanced traffic monitoring, behavioral analytics, data protection, troubleshooting, and more.

  • Win the War Against Ransomware

    Sponsored by: Commvault

    If you're ready to protect your data from the increasing risk of ransomware, consider these 6 tips.

  • The Internet of Things: Posing Security Threats and Delivering Beyond Expectations

    Sponsored by: Aruba Networks

    Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.

  • Overcoming the Human Factor with Visibility-Centric Security

    Sponsored by: Gigamon

    Discover how security pros can identify internal blind spots and overcome the shortcomings of prohibition-based security. Learn about a visibility platform that lets you verify and control network traffic without limiting employee productivity.

  • What Makes a Cyber Resilient Organization?

    Sponsored by: IBM Resilient

    With a surprising number of companies unsure of their ability to recover from cyberattacks, now is your time to ensure your organization can. Discover what it takes to be cyber resilient and prevent, detect, contain, and recover from a myriad of serious threats against data, applications, and IT infrastructure.

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Sponsored by: ComputerWeekly.com

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

  • Top 7 Reasons to Optimize Network Security with a Security Delivery Platform

    Sponsored by: Gigamon

    Uncover the top 7 reasons to optimize your network security model with a security delivery platform, ranging from evolving attacks like malware-as-a-service to the rise of SecOps.

  • 10 Advantages of a Proxy Deployment with a Next-Generation Firewall

    Sponsored by: Symantec & Blue Coat Systems

    Ensuring that your organization has a layered defense strategy in place is vital to combat today's threat landscape. Learn 10 advantages of layered defense, and what can be gained from pairing a proxy deployment with a next-generation firewall

  • Secure the App, Not the Device. Accelerate the Benefits of Mobility

    Sponsored by: Blue Cedar

    Open up this solution brief to learn about the current state of mobile security, and how the app, not the device became the center for security operations. Then, learn about a new way to inject security code into pre-existing app without disrupting the user experience.

  • Malware Review Q1 2017

    Sponsored by: PhishMe

    Learn what malware was up to in Q1 2017, what the numbers mean, and what can be learned to give your organization the ability to mitigate the next wave of malware.

  • Secure Your Data and Meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    Every company that takes card payments needs to comply with PCI DSS v3.1, and the requirements can get complicated quickly. Learn how to kill two birds with one stone and secure your organization while setting yourself up to comply with PCI DSS v3.1 requirements.

  • Analyzing the Malware Threat

    Sponsored by: Symantec & Blue Coat Systems

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

  • The App is the Endpoint

    Sponsored by: Blue Cedar

    Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.

  • How the Hybrid Cloud Changes the Game for Security

    Sponsored by: TrendMicro

    Discover the dynamics of the hybrid cloud, and uncover the security challenges that organizations are facing as they adopt the latest technologies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.