ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • Focus ASEAN: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

  • Q&A: Analyzing DNS Services with Paul Vixie

    Sponsored by: Farsight Security

    Dive into this interview as cybersecurity expert Paul Vixie, one of the founders of the Internet Software Consortium, talks about some of his ongoing domain name system (DNS) research, including how domain names are being abused and the data science of looking for patterns.

  • End-to-End Visibility: The Foundation of Business-Driven Security

    Sponsored by: RSA

    Access this white paper now to learn how to gain visibility into your network and: how logs are not enough when it comes to visibility, a patchwork of point-solutions creates inefficient silos, modern infrastructure compounds blind spots, and more.

  • How to Bridge the Gap in Data Protection and Recovery

    Sponsored by: Veeam Software

    In this white paper learn how backup appliances can ensure your data and documents can be recovered in case of loss and drive huge improvements in backup performance and recovery times. Also discover 5 common backup problems and their solutions, as well as 6 things to look for when choosing the right solution to bridge the availability gap.

  • Cloud Security: An Example Threat Report

    Sponsored by: Cloudvisory

    Learn what cloud threat information is vital to ensure that your enterprise gains the ability to see exactly what is deployed, where, and in real time; instant identification of any out-of-bound usage; a "baseline" state of the cloud deployment for comparison; and more.

  • 4 Requirements for a Multi-Cloud Security Approach

    Sponsored by: Cloudvisory

    Discover how to replace your traditional network controls with a centralized security policy management platform that can enforce policy through the existing granular, cloud-native security controls of each provider for tighter security with 4 requirements.

  • How to Gain Peace of Mind in the Cloud: Email and Office 365

    Sponsored by: Hewlett Packard Enterprise

    Discover how to obtain end-to-end encryption and full privacy in the cloud for your enterprise's email and Office 365. Learn why email remains at risk, what Forrester expert Kelley Mak thinks, and more.

  • Effective Information Governance Strategies

    Sponsored by: Iron Mountain

    In this e-guide, experts uncover how organizations are struggling to create effective information governance strategies and the increasing effects BYOD, Big Data, and hybrid storage environments are having on this process.

  • New GDPR Mandates Require Changes to Storage Management Strategies for All Global Enterprises

    Sponsored by: Hewlett-Packard Enterprise

    With failure to comply to the GDPR causing a company to be subject to a fine up to €20 million or 4% of total yearly worldwide turnover (whichever is higher) and/or regular audits, planning to pay isn't an option. Access this Gartner report now to learn how to make an actionable plan for GDPR compliance and avoid business-breaking fines.

  • Cloud Security Report: How is IT Responding to Today's Threats

    Sponsored by: Cloudvisory

    Access this 2017 cloud security spotlight report to learn how organizations are responding to the security threats in the cloud, and what tools and best practices IT security leaders are considering in their move to the cloud, and more.

  • 7 Questions to Achieve GDPR Compliance

    Sponsored by: Hewlett-Packard Enterprise

    Discover the answers to seven questions that can help you achieve GDPR compliance, covering subjects like how to address your readiness status, what information falls under these regulations, how to respond to legal matters, and more.

  • Compliance and Beyond: Future-Proofing Your Password Policy

    Sponsored by: Specops Software

    This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.

  • Migration to Exchange Online and Office 365: A Step-by-Step Guide

    Sponsored by: Hewlett Packard Enterprise

    For IT administrators who have not been involved in a previous migration to Office 365, there is a steep learning curve. In this step-by-step guide, learn how to select the migration option that makes most sense for your organization to ensure future success and reliable security.

  • Beginner's Guide to Hybrid Cloud Security

    Sponsored by: AlienVault

    Learn everything you need for a successful hybrid cloud deployment, including: the cloud security shared responsibility model, how familiar network security challenges persist in the cloud, what new security challenges emerge in the cloud, and a smarter approach to threat detection in hybrid cloud security.

  • Focus ANZ: Security & Digital Transformation

    Sponsored by: ComputerWeekly.com

    With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.

  • Information Insight for GDPR Compliance

    Sponsored by: Hewlett-Packard Enterprise

    Learn about the General Data Protection Regulation and its impact on compliance in the enterprise. Learn the objectives of GDPR for citizens and enterprises, the business opportunity of GDPR, and more.

  • ISC2 CCSP

    Sponsored by: ISC2

    Examine the relationship between IT and the C-suite, as well as the rise of the cloud security professional as an emerging voice within IT and the business.

  • Your Guide To Today's Cloud Security Adoption Trends

    Sponsored by: ISC2

    Security of critical data systems remain a key barrier to adoption of cloud services. In this comprehensive cloud security report discover cloud adoption trends, top cloud security challenges, paths to stronger cloud security, and more.

  • Evolving Your Business with IoT: Six Steps to a Secure Digital Transformation

    Sponsored by: Appdirect

    Discover 6 steps to have your organization undergo a secure IoT digital transformation and enable new types of innovation, creativity, and business models.

  • Is your IT Security Affecting your Workforce Productivity?

    Sponsored by: Dell EMC and Microsoft

    In this Forrester report discover if your IT security is affecting your workforce productivity. Learn how employee experience and security must go hand in hand, how enterprise endpoints are not secure, and more.

  • Incident Response Tools Can Help Automate Your Security

    Sponsored by: ModoModo

    A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.

  • How-to Guide: Local, Remote, and Centrally Unified Key Management

    Sponsored by: Hewlett Packard Enterprise

    Discover a unified encrypting data and key management approach with strong access controls that deliver reliable security, ensuring continuous and appropriate availability to keys while supporting audit and compliance requirements.

  • How the World's Leading Engineering Design Automation (EDA) Firm Protects Intellectual Property

    Sponsored by: Ghangor Cloud

    In this short case study, learn how a leading engineering design automation firm was able to secure their intellectual property and end serious security incidents with an advanced security platform.

  • How Proper Key Management Can Protect Your Data

    Sponsored by: Hewlett Packard Enterprise

    With a shift on the threat landscape from simple to sophisticated, ensuring the highest level of reliability, availability, and disaster recovery seems a lofty goal. Discover what role key management can play in critical data protection and business continuity architecture.

  • Choosing the Right Provider for Mobile and Cloud Security

    Sponsored by: MobileIron

    Learn about a mobile and cloud security provider that can help you secure any mobile app or cloud service on any device, simplify user access with certificate-based authentication, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.