ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Policies Research

  • 7 Modern Encryption Problems

    Sponsored by: Blue Coat Systems

    This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.

  • A Technology Brief on SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.

  • The Cloud: Securing Your Enterprise both Before and After Migration

    Sponsored by: Armor

    In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.

  • Eliminating Constraints to SSL Implementation

    Sponsored by: Blue Coat Systems

    Find comprehensive information on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Uncover ways to increase its performance, scalability, and root out malicious activity using it as a cover.

  • 5 Steps to Implement and Maintain PCI DSS Compliance

    Sponsored by: AlienVault

    In this resource, you'll find an easy to follow guide for success when it comes to the troubles Payment Card Industry Data Security Standards (PCI DSS) can cause your enterprise. Uncover 5 steps to achieving PCI DSS compliance.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    Discover a six-step methodology that helps you operationalize the detection of a security incident using your existing SIEM.

  • ESG Lab Review: User Behavior Analytics

    Sponsored by: Exabeam

    Discover the results of hands-on testing of a User Behavior Analytics (UBA) platform. Learn not only what such a platform should provide, but also how it tracks its users, identifies anomalous behaviors, and more.

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    Sponsored by: ComputerWeekly.com

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

  • Building Success: Strengthen your Data Discovery and Classification

    Sponsored by: IBM

    How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.

  • Technology Platforms for Business Integration

    Sponsored by: Infor

    Discover why it's essential for companies to consider the readiness of their IT infrastructure as they consider the possibility of acquiring or being acquired by another company.

  • The Art and Science of Value Realization in the Cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • Going global: Get up and running quickly no matter where you need to go

    Sponsored by: Infor

    Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Applying Data Science to User and Entity Behavior Analytics

    Sponsored by: Exabeam

    Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.

  • Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust

    Sponsored by: LogRhythm, Inc.

    Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Balancing Personalization and Trust in the Age of the Customer

    Sponsored by: Gigya

    Discover how to not only gain access to superior data on your customer base but also utilize that data to your enterprise's greatest advantage. Find out how such an approach has driven massive increases in usable customer data for companies such as Danone and Forbes.

  • Businesses Should Begin Preparing for the Death of the Password

    Sponsored by: Gigya

    Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.

  • Mobile Threat Prevention Behavioral Risk Analysis

    Sponsored by: Check Point Software Technologies Ltd.

    Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.

  • A CISO’s Guide to Mobile Threat Prevention

    Sponsored by: Check Point Software Technologies Ltd.

    Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.

  • Mobility In Government Services: A Checklist Towards Regulatory Compliance

    Sponsored by: BlackBerry

    Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.

  • How to get the best protection from your CASB

    Sponsored by: Palerra Inc.

    Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.